[web] Fix title strings for F11 SG

Rüdiger Landmann rlandmann at fedoraproject.org
Sun Jun 13 07:56:20 UTC 2010


commit e495e58175eb6ef4a0df6b1ce18f03b05aedeece
Author: Ruediger Landmann <r.landmann at redhat.com>
Date:   Sun Jun 13 17:54:10 2010 +1000

    Fix title strings for F11 SG

 fedoradocs.db                                      |  Bin 338944 -> 338944 bytes
 .../Fedora-11-Security_Guide-es-ES.epub            |  Bin 779823 -> 779851 bytes
 .../11/html-single/Security_Guide/index.html       |   70 ++++++++++----------
 ...ide-Encryption-Data_in_Motion-Secure_Shell.html |    2 +-
 ...on-Data_in_Motion-Virtual_Private_Networks.html |    2 +-
 .../Security_Guide-Encryption-Data_in_Motion.html  |    2 +-
 ...tecting_Data_at_Rest-File_Based_Encryption.html |    2 +-
 .../11/html/Security_Guide/We_Need_Feedback.html   |    2 +-
 .../chap-Security_Guide-Encryption.html            |    2 +-
 ...General_Principles_of_Information_Security.html |    2 +-
 .../chap-Security_Guide-References.html            |    2 +-
 .../chap-Security_Guide-Secure_Installation.html   |    2 +-
 .../chap-Security_Guide-Securing_Your_Network.html |   18 +++---
 .../chap-Security_Guide-Security_Overview.html     |   36 +++++-----
 .../chap-Security_Guide-Software_Maintenance.html  |    2 +-
 .../es-ES/Fedora/11/html/Security_Guide/index.html |    6 +-
 .../pref-Security_Guide-Preface.html               |   10 ++--
 ...y_Guide-Additional_Resources-Related_Books.html |    2 +-
 ...Additional_Resources-Related_Documentation.html |    2 +-
 ...itional_Resources-Useful_Firewall_Websites.html |    2 +-
 ...tional_Resources-Useful_IP_Tables_Websites.html |    2 +-
 ...itional_Resources-Useful_Kerberos_Websites.html |    2 +-
 ...e-Additional_Resources-Useful_PAM_Websites.html |    2 +-
 ...nal_Resources-Useful_TCP_Wrappers_Websites.html |    2 +-
 ...Configuration_Files-Access_Control_Options.html |    2 +-
 ...tion_Files-Binding_and_Redirection_Options.html |    2 +-
 ...guration_Files-Resource_Management_Options.html |    2 +-
 ...ulnerabilities-Threats_to_Network_Security.html |    2 +-
 ...Vulnerabilities-Threats_to_Server_Security.html |    2 +-
 ...hreats_to_Workstation_and_Home_PC_Security.html |    2 +-
 ...curity_Guide-Attackers_and_Vulnerabilities.html |    2 +-
 ...figuration-Activating_the_IPTables_Service.html |    2 +-
 ...ration-Enabling_and_Disabling_the_Firewall.html |    2 +-
 ...e-Basic_Firewall_Configuration-Other_Ports.html |    2 +-
 ...Firewall_Configuration-Saving_the_Settings.html |    2 +-
 ...ic_Firewall_Configuration-Trusted_Services.html |    2 +-
 ...mmand_Options_for_IPTables-Command_Options.html |    2 +-
 ...ptions_for_IPTables-IPTables_Match_Options.html |    2 +-
 ...ns_for_IPTables-IPTables_Parameter_Options.html |    2 +-
 ...mmand_Options_for_IPTables-Listing_Options.html |    2 +-
 ...ommand_Options_for_IPTables-Target_Options.html |    2 +-
 ...Security_Guide-Common_Exploits_and_Attacks.html |    2 +-
 ...crypted_Archives-Installation-Instructions.html |    2 +-
 ...on-7_Zip_Encrypted_Archives-Things_of_note.html |    2 +-
 ..._Zip_Encrypted_Archives-Usage_Instructions.html |    2 +-
 ..._Guide-Encryption-7_Zip_Encrypted_Archives.html |    2 +-
 ...otecting_Data_at_Rest-Full_Disk_Encryption.html |    2 +-
 ...tion-Using_GPG-About_Public_Key_Encryption.html |    2 +-
 ...ryption-Using_GPG-Creating_GPG_Keys_in_KDE.html |    2 +-
 ...yption-Using_GPG-Creating_GPG_Keys_in_KDE1.html |    2 +-
 .../sect-Security_Guide-Encryption-Using_GPG.html  |    2 +-
 ...g_the_Tools-Anticipating_Your_Future_Needs.html |    2 +-
 ...Security_Guide-Evaluating_the_Tools-Nessus.html |    2 +-
 ...-Security_Guide-Evaluating_the_Tools-Nikto.html |    2 +-
 ...uide-Evaluating_the_Tools-VLAD_the_Scanner.html |    2 +-
 ...de-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html |    2 +-
 ...ity_Guide-FORWARD_and_NAT_Rules-Prerouting.html |    2 +-
 ...urity_Guide-Firewalls-Additional_Resources.html |    2 +-
 ...ide-Firewalls-Basic_Firewall_Configuration.html |    2 +-
 ..._Guide-Firewalls-Common_IPTables_Filtering.html |    2 +-
 ...rity_Guide-Firewalls-FORWARD_and_NAT_Rules.html |    2 +-
 ...Firewalls-IPTables_and_Connection_Tracking.html |    2 +-
 .../sect-Security_Guide-Firewalls-IPv6.html        |    2 +-
 ...alicious_Software_and_Spoofed_IP_Addresses.html |    2 +-
 ...ct-Security_Guide-Firewalls-Using_IPTables.html |    2 +-
 .../sect-Security_Guide-Firewalls.html             |    2 +-
 ...curity_Guide-IPTables-Additional_Resources.html |    2 +-
 ...uide-IPTables-Command_Options_for_IPTables.html |    2 +-
 ...-Differences_Between_IPTables_and_IPChains.html |    2 +-
 ...ty_Guide-IPTables-IPTables_Control_Scripts.html |    2 +-
 ...-Security_Guide-IPTables-IPTables_and_IPv6.html |    2 +-
 ...urity_Guide-IPTables-Saving_IPTables_Rules.html |    2 +-
 .../sect-Security_Guide-IPTables.html              |    2 +-
 ...ch_Options-Additional_Match_Option_Modules.html |    2 +-
 ...Guide-IPTables_Match_Options-ICMP_Protocol.html |    2 +-
 ..._Guide-IPTables_Match_Options-UDP_Protocol.html |    2 +-
 ...on-Manual_IPsec_Host_to_Host_Configuration.html |    2 +-
 ...ual_IPsec_Network_to_Network_Configuration.html |    2 +-
 ...curity_Guide-Kerberos-Additional_Resources.html |    2 +-
 ...e-Kerberos-Configuring_a_Kerberos_5_Client.html |    2 +-
 ...e-Kerberos-Configuring_a_Kerberos_5_Server.html |    2 +-
 ...ity_Guide-Kerberos-Domain_to_Realm_Mapping.html |    2 +-
 ...Security_Guide-Kerberos-How_Kerberos_Works.html |    2 +-
 ...curity_Guide-Kerberos-Kerberos_Terminology.html |    2 +-
 ...t-Security_Guide-Kerberos-Kerberos_and_PAM.html |    2 +-
 ...eros-Setting_Up_Cross_Realm_Authentication.html |    2 +-
 ...y_Guide-Kerberos-Setting_Up_Secondary_KDCs.html |    2 +-
 .../sect-Security_Guide-Kerberos.html              |    6 +-
 ...ide-LUKS_Disk_Encryption-Links_of_Interest.html |    2 +-
 ...ting_Directories-Step_by_Step_Instructions.html |    2 +-
 ...irectories-What_you_have_just_accomplished.html |    2 +-
 ...Encryption-Manually_Encrypting_Directories.html |    2 +-
 .../sect-Security_Guide-LUKS_Disk_Encryption.html  |    2 +-
 ...ecurity_Guide-Option_Fields-Access_Control.html |    2 +-
 ...ct-Security_Guide-Option_Fields-Expansions.html |    2 +-
 ...ecurity_Guide-Option_Fields-Shell_Commands.html |    2 +-
 ...PAM_Configuration_File_Format-Control_Flag.html |    2 +-
 ...Configuration_File_Format-Module_Arguments.html |    2 +-
 ...-PAM_Configuration_File_Format-Module_Name.html |    2 +-
 ...al_Caching-Common_pam_timestamp_Directives.html |    2 +-
 ...AM_and_Device_Ownership-Application_Access.html |    2 +-
 ...ntication_Modules_PAM-Additional_Resources.html |    2 +-
 ...ntication_Modules_PAM-Creating_PAM_Modules.html |    2 +-
 ..._Modules_PAM-PAM_Configuration_File_Format.html |    2 +-
 ...cation_Modules_PAM-PAM_Configuration_Files.html |    2 +-
 ...-PAM_and_Administrative_Credential_Caching.html |    2 +-
 ...ation_Modules_PAM-PAM_and_Device_Ownership.html |    2 +-
 ...Modules_PAM-Sample_PAM_Configuration_Files.html |    2 +-
 ...Guide-Pluggable_Authentication_Modules_PAM.html |    2 +-
 ...allation-Utilize_LUKS_Partition_Encryption.html |    2 +-
 ...curity_Guide-Securing_FTP-Anonymous_Access.html |    2 +-
 ...ing_FTP-Use_TCP_Wrappers_To_Control_Access.html |    2 +-
 ...-Security_Guide-Securing_FTP-User_Accounts.html |    2 +-
 ...Guide-Securing_NFS-Beware_of_Syntax_Errors.html |    2 +-
 ...g_NFS-Do_Not_Use_the_no_root_squash_Option.html |    2 +-
 ...de-Securing_NFS-NFS_Firewall_Configuration.html |    2 +-
 ...Assign_Static_Ports_and_Use_iptables_Rules.html |    2 +-
 ...Securing_NIS-Edit_the_varypsecurenets_File.html |    2 +-
 ...e-Securing_NIS-Use_Kerberos_Authentication.html |    2 +-
 ...Password_like_NIS_Domain_Name_and_Hostname.html |    2 +-
 ...ring_Portmap-Protect_portmap_With_iptables.html |    2 +-
 ...ty_Guide-Securing_Sendmail-Mail_only_Users.html |    2 +-
 ...y_Guide-Securing_Sendmail-NFS_and_Sendmail.html |    2 +-
 .../sect-Security_Guide-Security_Updates.html      |    2 +-
 ...ecurity_Guide-Server_Security-Securing_FTP.html |    2 +-
 ...ecurity_Guide-Server_Security-Securing_NFS.html |    2 +-
 ...ecurity_Guide-Server_Security-Securing_NIS.html |    2 +-
 ...ity_Guide-Server_Security-Securing_Portmap.html |    2 +-
 ...ty_Guide-Server_Security-Securing_Sendmail.html |    2 +-
 ...r_Security-Securing_the_Apache_HTTP_Server.html |    2 +-
 ...curity-Verifying_Which_Ports_Are_Listening.html |    2 +-
 .../sect-Security_Guide-Server_Security.html       |    2 +-
 ...onfiguring_Firefox_to_use_Kerberos_for_SSO.html |    2 +-
 ...O-Getting_Started_with_your_new_Smart_Card.html |    2 +-
 ...ign_on_SSO-How_Smart_Card_Enrollment_Works.html |    2 +-
 ...gle_Sign_on_SSO-How_Smart_Card_Login_Works.html |    2 +-
 .../sect-Security_Guide-Single_Sign_on_SSO.html    |    2 +-
 ...gned_Packages_from_Well_Known_Repositories.html |    2 +-
 ...curity_Updates-Adjusting_Automatic_Updates.html |    2 +-
 ...enance-Plan_and_Configure_Security_Updates.html |    2 +-
 ...Wrappers_Configuration_Files-Option_Fields.html |    2 +-
 ...P_Wrappers_and_xinetd-Additional_Resources.html |    2 +-
 ...nd_xinetd-TCP_Wrappers_Configuration_Files.html |    2 +-
 ...urity_Guide-TCP_Wrappers_and_xinetd-xinetd.html |    2 +-
 ...pers_and_xinetd-xinetd_Configuration_Files.html |    2 +-
 ...ect-Security_Guide-TCP_Wrappers_and_xinetd.html |    2 +-
 ...Server_Security-Inattentive_Administration.html |    6 +-
 ...rver_Security-Inherently_Insecure_Services.html |    2 +-
 ...eats_to_Server_Security-Unpatched_Services.html |    2 +-
 ...PC_Security-Vulnerable_Client_Applications.html |    2 +-
 ...ide-Updating_Packages-Applying_the_Changes.html |    2 +-
 ...dating_Packages-Installing_Signed_Packages.html |    2 +-
 ...pdating_Packages-Verifying_Signed_Packages.html |    2 +-
 ...ide-Using_IPTables-Basic_Firewall_Policies.html |    2 +-
 ...Tables-Saving_and_Restoring_IPTables_Rules.html |    2 +-
 ...Networks_VPNs-Creating_an_IPsec_Connection.html |    2 +-
 ..._Guide-Virtual_Private_Networks_VPNs-IPsec.html |    2 +-
 ...orks_VPNs-IPsec_Host_to_Host_Configuration.html |    2 +-
 ...l_Private_Networks_VPNs-IPsec_Installation.html |    2 +-
 ...PNs-IPsec_Network_to_Network_Configuration.html |    2 +-
 ...-Starting_and_Stopping_an_IPsec_Connection.html |    2 +-
 ...irtual_Private_Networks_VPNs-VPNs_and_PROD.html |    2 +-
 ...curity_Guide-Virtual_Private_Networks_VPNs.html |    2 +-
 ...Assessment-Defining_Assessment_and_Testing.html |    2 +-
 ...nerability_Assessment-Evaluating_the_Tools.html |    2 +-
 ...ct-Security_Guide-Vulnerability_Assessment.html |    2 +-
 ..._Files-Altering_xinetd_Configuration_Files.html |    2 +-
 ...figuration_Files-The_etcxinetd.d_Directory.html |    2 +-
 .../Fedora-11-Security_Guide-es-ES.pdf             |  Bin 1445971 -> 1445592 bytes
 public_html/es-ES/toc.html                         |    2 +-
 .../Fedora-11-Security_Guide-nl-NL.epub            |  Bin 769775 -> 769762 bytes
 .../11/html-single/Security_Guide/index.html       |   70 ++++++++++----------
 ...ide-Encryption-Data_in_Motion-Secure_Shell.html |    2 +-
 ...on-Data_in_Motion-Virtual_Private_Networks.html |    2 +-
 .../Security_Guide-Encryption-Data_in_Motion.html  |    2 +-
 ...tecting_Data_at_Rest-File_Based_Encryption.html |    2 +-
 .../11/html/Security_Guide/We_Need_Feedback.html   |    2 +-
 .../chap-Security_Guide-Encryption.html            |    2 +-
 ...General_Principles_of_Information_Security.html |    2 +-
 .../chap-Security_Guide-References.html            |    2 +-
 .../chap-Security_Guide-Secure_Installation.html   |    2 +-
 .../chap-Security_Guide-Securing_Your_Network.html |   18 +++---
 .../chap-Security_Guide-Security_Overview.html     |   36 +++++-----
 .../chap-Security_Guide-Software_Maintenance.html  |    2 +-
 .../nl-NL/Fedora/11/html/Security_Guide/index.html |    6 +-
 .../pref-Security_Guide-Preface.html               |   10 ++--
 ...y_Guide-Additional_Resources-Related_Books.html |    2 +-
 ...Additional_Resources-Related_Documentation.html |    2 +-
 ...itional_Resources-Useful_Firewall_Websites.html |    2 +-
 ...tional_Resources-Useful_IP_Tables_Websites.html |    2 +-
 ...itional_Resources-Useful_Kerberos_Websites.html |    2 +-
 ...e-Additional_Resources-Useful_PAM_Websites.html |    2 +-
 ...nal_Resources-Useful_TCP_Wrappers_Websites.html |    2 +-
 ...Configuration_Files-Access_Control_Options.html |    2 +-
 ...tion_Files-Binding_and_Redirection_Options.html |    2 +-
 ...guration_Files-Resource_Management_Options.html |    2 +-
 ...ulnerabilities-Threats_to_Network_Security.html |    2 +-
 ...Vulnerabilities-Threats_to_Server_Security.html |    2 +-
 ...hreats_to_Workstation_and_Home_PC_Security.html |    2 +-
 ...curity_Guide-Attackers_and_Vulnerabilities.html |    2 +-
 ...figuration-Activating_the_IPTables_Service.html |    2 +-
 ...ration-Enabling_and_Disabling_the_Firewall.html |    2 +-
 ...e-Basic_Firewall_Configuration-Other_Ports.html |    2 +-
 ...Firewall_Configuration-Saving_the_Settings.html |    2 +-
 ...ic_Firewall_Configuration-Trusted_Services.html |    2 +-
 ...mmand_Options_for_IPTables-Command_Options.html |    2 +-
 ...ptions_for_IPTables-IPTables_Match_Options.html |    2 +-
 ...ns_for_IPTables-IPTables_Parameter_Options.html |    2 +-
 ...mmand_Options_for_IPTables-Listing_Options.html |    2 +-
 ...ommand_Options_for_IPTables-Target_Options.html |    2 +-
 ...Security_Guide-Common_Exploits_and_Attacks.html |    2 +-
 ...crypted_Archives-Installation-Instructions.html |    2 +-
 ...on-7_Zip_Encrypted_Archives-Things_of_note.html |    2 +-
 ..._Zip_Encrypted_Archives-Usage_Instructions.html |    2 +-
 ..._Guide-Encryption-7_Zip_Encrypted_Archives.html |    2 +-
 ...otecting_Data_at_Rest-Full_Disk_Encryption.html |    2 +-
 ...tion-Using_GPG-About_Public_Key_Encryption.html |    2 +-
 ...ryption-Using_GPG-Creating_GPG_Keys_in_KDE.html |    2 +-
 ...yption-Using_GPG-Creating_GPG_Keys_in_KDE1.html |    2 +-
 .../sect-Security_Guide-Encryption-Using_GPG.html  |    2 +-
 ...g_the_Tools-Anticipating_Your_Future_Needs.html |    2 +-
 ...Security_Guide-Evaluating_the_Tools-Nessus.html |    2 +-
 ...-Security_Guide-Evaluating_the_Tools-Nikto.html |    2 +-
 ...uide-Evaluating_the_Tools-VLAD_the_Scanner.html |    2 +-
 ...de-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html |    2 +-
 ...ity_Guide-FORWARD_and_NAT_Rules-Prerouting.html |    2 +-
 ...urity_Guide-Firewalls-Additional_Resources.html |    2 +-
 ...ide-Firewalls-Basic_Firewall_Configuration.html |    2 +-
 ..._Guide-Firewalls-Common_IPTables_Filtering.html |    2 +-
 ...rity_Guide-Firewalls-FORWARD_and_NAT_Rules.html |    2 +-
 ...Firewalls-IPTables_and_Connection_Tracking.html |    2 +-
 .../sect-Security_Guide-Firewalls-IPv6.html        |    2 +-
 ...alicious_Software_and_Spoofed_IP_Addresses.html |    2 +-
 ...ct-Security_Guide-Firewalls-Using_IPTables.html |    2 +-
 .../sect-Security_Guide-Firewalls.html             |    2 +-
 ...curity_Guide-IPTables-Additional_Resources.html |    2 +-
 ...uide-IPTables-Command_Options_for_IPTables.html |    2 +-
 ...-Differences_Between_IPTables_and_IPChains.html |    2 +-
 ...ty_Guide-IPTables-IPTables_Control_Scripts.html |    2 +-
 ...-Security_Guide-IPTables-IPTables_and_IPv6.html |    2 +-
 ...urity_Guide-IPTables-Saving_IPTables_Rules.html |    2 +-
 .../sect-Security_Guide-IPTables.html              |    2 +-
 ...ch_Options-Additional_Match_Option_Modules.html |    2 +-
 ...Guide-IPTables_Match_Options-ICMP_Protocol.html |    2 +-
 ..._Guide-IPTables_Match_Options-UDP_Protocol.html |    2 +-
 ...on-Manual_IPsec_Host_to_Host_Configuration.html |    2 +-
 ...ual_IPsec_Network_to_Network_Configuration.html |    2 +-
 ...curity_Guide-Kerberos-Additional_Resources.html |    2 +-
 ...e-Kerberos-Configuring_a_Kerberos_5_Client.html |    2 +-
 ...e-Kerberos-Configuring_a_Kerberos_5_Server.html |    2 +-
 ...ity_Guide-Kerberos-Domain_to_Realm_Mapping.html |    2 +-
 ...Security_Guide-Kerberos-How_Kerberos_Works.html |    2 +-
 ...curity_Guide-Kerberos-Kerberos_Terminology.html |    2 +-
 ...t-Security_Guide-Kerberos-Kerberos_and_PAM.html |    2 +-
 ...eros-Setting_Up_Cross_Realm_Authentication.html |    2 +-
 ...y_Guide-Kerberos-Setting_Up_Secondary_KDCs.html |    2 +-
 .../sect-Security_Guide-Kerberos.html              |    6 +-
 ...ide-LUKS_Disk_Encryption-Links_of_Interest.html |    2 +-
 ...ting_Directories-Step_by_Step_Instructions.html |    2 +-
 ...irectories-What_you_have_just_accomplished.html |    2 +-
 ...Encryption-Manually_Encrypting_Directories.html |    2 +-
 .../sect-Security_Guide-LUKS_Disk_Encryption.html  |    2 +-
 ...ecurity_Guide-Option_Fields-Access_Control.html |    2 +-
 ...ct-Security_Guide-Option_Fields-Expansions.html |    2 +-
 ...ecurity_Guide-Option_Fields-Shell_Commands.html |    2 +-
 ...PAM_Configuration_File_Format-Control_Flag.html |    2 +-
 ...Configuration_File_Format-Module_Arguments.html |    2 +-
 ...-PAM_Configuration_File_Format-Module_Name.html |    2 +-
 ...al_Caching-Common_pam_timestamp_Directives.html |    2 +-
 ...AM_and_Device_Ownership-Application_Access.html |    2 +-
 ...ntication_Modules_PAM-Additional_Resources.html |    2 +-
 ...ntication_Modules_PAM-Creating_PAM_Modules.html |    2 +-
 ..._Modules_PAM-PAM_Configuration_File_Format.html |    2 +-
 ...cation_Modules_PAM-PAM_Configuration_Files.html |    2 +-
 ...-PAM_and_Administrative_Credential_Caching.html |    2 +-
 ...ation_Modules_PAM-PAM_and_Device_Ownership.html |    2 +-
 ...Modules_PAM-Sample_PAM_Configuration_Files.html |    2 +-
 ...Guide-Pluggable_Authentication_Modules_PAM.html |    2 +-
 ...allation-Utilize_LUKS_Partition_Encryption.html |    2 +-
 ...curity_Guide-Securing_FTP-Anonymous_Access.html |    2 +-
 ...ing_FTP-Use_TCP_Wrappers_To_Control_Access.html |    2 +-
 ...-Security_Guide-Securing_FTP-User_Accounts.html |    2 +-
 ...Guide-Securing_NFS-Beware_of_Syntax_Errors.html |    2 +-
 ...g_NFS-Do_Not_Use_the_no_root_squash_Option.html |    2 +-
 ...de-Securing_NFS-NFS_Firewall_Configuration.html |    2 +-
 ...Assign_Static_Ports_and_Use_iptables_Rules.html |    2 +-
 ...Securing_NIS-Edit_the_varypsecurenets_File.html |    2 +-
 ...e-Securing_NIS-Use_Kerberos_Authentication.html |    2 +-
 ...Password_like_NIS_Domain_Name_and_Hostname.html |    2 +-
 ...ring_Portmap-Protect_portmap_With_iptables.html |    2 +-
 ...ty_Guide-Securing_Sendmail-Mail_only_Users.html |    2 +-
 ...y_Guide-Securing_Sendmail-NFS_and_Sendmail.html |    2 +-
 .../sect-Security_Guide-Security_Updates.html      |    2 +-
 ...ecurity_Guide-Server_Security-Securing_FTP.html |    2 +-
 ...ecurity_Guide-Server_Security-Securing_NFS.html |    2 +-
 ...ecurity_Guide-Server_Security-Securing_NIS.html |    2 +-
 ...ity_Guide-Server_Security-Securing_Portmap.html |    2 +-
 ...ty_Guide-Server_Security-Securing_Sendmail.html |    2 +-
 ...r_Security-Securing_the_Apache_HTTP_Server.html |    2 +-
 ...curity-Verifying_Which_Ports_Are_Listening.html |    2 +-
 .../sect-Security_Guide-Server_Security.html       |    2 +-
 ...onfiguring_Firefox_to_use_Kerberos_for_SSO.html |    2 +-
 ...O-Getting_Started_with_your_new_Smart_Card.html |    2 +-
 ...ign_on_SSO-How_Smart_Card_Enrollment_Works.html |    2 +-
 ...gle_Sign_on_SSO-How_Smart_Card_Login_Works.html |    2 +-
 .../sect-Security_Guide-Single_Sign_on_SSO.html    |    2 +-
 ...gned_Packages_from_Well_Known_Repositories.html |    2 +-
 ...curity_Updates-Adjusting_Automatic_Updates.html |    2 +-
 ...enance-Plan_and_Configure_Security_Updates.html |    2 +-
 ...Wrappers_Configuration_Files-Option_Fields.html |    2 +-
 ...P_Wrappers_and_xinetd-Additional_Resources.html |    2 +-
 ...nd_xinetd-TCP_Wrappers_Configuration_Files.html |    2 +-
 ...urity_Guide-TCP_Wrappers_and_xinetd-xinetd.html |    2 +-
 ...pers_and_xinetd-xinetd_Configuration_Files.html |    2 +-
 ...ect-Security_Guide-TCP_Wrappers_and_xinetd.html |    2 +-
 ...Server_Security-Inattentive_Administration.html |    6 +-
 ...rver_Security-Inherently_Insecure_Services.html |    2 +-
 ...eats_to_Server_Security-Unpatched_Services.html |    2 +-
 ...PC_Security-Vulnerable_Client_Applications.html |    2 +-
 ...ide-Updating_Packages-Applying_the_Changes.html |    2 +-
 ...dating_Packages-Installing_Signed_Packages.html |    2 +-
 ...pdating_Packages-Verifying_Signed_Packages.html |    2 +-
 ...ide-Using_IPTables-Basic_Firewall_Policies.html |    2 +-
 ...Tables-Saving_and_Restoring_IPTables_Rules.html |    2 +-
 ...Networks_VPNs-Creating_an_IPsec_Connection.html |    2 +-
 ..._Guide-Virtual_Private_Networks_VPNs-IPsec.html |    2 +-
 ...orks_VPNs-IPsec_Host_to_Host_Configuration.html |    2 +-
 ...l_Private_Networks_VPNs-IPsec_Installation.html |    2 +-
 ...PNs-IPsec_Network_to_Network_Configuration.html |    2 +-
 ...-Starting_and_Stopping_an_IPsec_Connection.html |    2 +-
 ...irtual_Private_Networks_VPNs-VPNs_and_PROD.html |    2 +-
 ...curity_Guide-Virtual_Private_Networks_VPNs.html |    2 +-
 ...Assessment-Defining_Assessment_and_Testing.html |    2 +-
 ...nerability_Assessment-Evaluating_the_Tools.html |    2 +-
 ...ct-Security_Guide-Vulnerability_Assessment.html |    2 +-
 ..._Files-Altering_xinetd_Configuration_Files.html |    2 +-
 ...figuration_Files-The_etcxinetd.d_Directory.html |    2 +-
 .../Fedora-11-Security_Guide-nl-NL.pdf             |  Bin 1403877 -> 1403211 bytes
 public_html/nl-NL/toc.html                         |    2 +-
 public_html/toc.html                               |    4 +-
 340 files changed, 474 insertions(+), 474 deletions(-)
---
diff --git a/fedoradocs.db b/fedoradocs.db
index b44c625..c922979 100644
Binary files a/fedoradocs.db and b/fedoradocs.db differ
diff --git a/public_html/es-ES/Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-es-ES.epub b/public_html/es-ES/Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-es-ES.epub
index cd3dc9a..f1ac280 100644
Binary files a/public_html/es-ES/Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-es-ES.epub and b/public_html/es-ES/Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-es-ES.epub differ
diff --git a/public_html/es-ES/Fedora/11/html-single/Security_Guide/index.html b/public_html/es-ES/Fedora/11/html-single/Security_Guide/index.html
index bccbdce..5e2526e 100644
--- a/public_html/es-ES/Fedora/11/html-single/Security_Guide/index.html
+++ b/public_html/es-ES/Fedora/11/html-single/Security_Guide/index.html
@@ -1,9 +1,9 @@
 <?xml version="1.0" encoding="UTF-8"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Security Guide</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><meta name="description" content="La Guía de Seguridad Linux está diseñada para asistir a usuarios de Linux en el proceso de aprendizaje y en la realización de prácticas de seguridad en estaciones de trabajo y servidores, para poder así evitar intrusiones locales y remotas, explotaciones, y actividades maliciosas. La Guía de Seguridad Linux detalla la planificación y describe las herramientas involucradas en la creación de un entorno de computación seguro, ya sea para centros de datos, estaciones de trabajo, o el hogar. Con un conocimie
 nto administrativo apropiado, vigilancia, y herramientas, los sistemas ejecutando Linux pueden ser funcionales y al mismo tiempo seguros, frente a los métodos de intrusión y explotación mas comunes." /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><div xml:lang="es-ES" class="book" title="Security Guide" lang="es-ES"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber
 ">11</span></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="id1174827" class="title">Security Guide</h1></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">Una guía para la seguridad en fedora</h2></div><p class="edition">Edición 1.0</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Guía de Seguridad</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><meta name="description" content="La Guía de Seguridad Linux está diseñada para asistir a usuarios de Linux en el proceso de aprendizaje y en la realización de prácticas de seguridad en estaciones de trabajo y servidores, para poder así evitar intrusiones locales y remotas, explotaciones, y actividades maliciosas. La Guía de Seguridad Linux detalla la planificación y describe las herramientas involucradas en la creación de un entorno de computación seguro, ya sea para centros de datos, estaciones de trabajo, o el hogar. Con un conoc
 imiento administrativo apropiado, vigilancia, y herramientas, los sistemas ejecutando Linux pueden ser funcionales y al mismo tiempo seguros, frente a los métodos de intrusión y explotación mas comunes." /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><div xml:lang="es-ES" class="book" title="Guía de Seguridad" lang="es-ES"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="produ
 ctnumber">11</span></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="id1054592" class="title">Guía de Seguridad</h1></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">Una guía para la seguridad en fedora</h2></div><p class="edition">Edición 1.0</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
 		<span class="inlinemediaobject"><object data="Common_Content/images/title_logo.svg" type="image/svg+xml"> Fedora Documentation Project</object></span>
 
-	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="es-ES" class="authorgroup" lang="es-ES"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="id1264165" class="legalnotice"><h1 class="legalnotice">Aviso Legal</h1><div class="para">
+	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="es-ES" class="authorgroup" lang="es-ES"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="id1277146" class="legalnotice"><h1 class="legalnotice">Aviso Legal</h1><div class="para">
 		Copyright <span class="trademark"></span>© 2008 Red Hat, Inc.
 	</div><div class="para">
 		The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at <a href="http://creativecommons.org/licenses/by-sa/3.0/">http://creativecommons.org/licenses/by-sa/3.0/</a>. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
@@ -23,11 +23,11 @@
 		All other trademarks are the property of their respective owners.
 	</div></div></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div class="abstract" title="Resumen"><h6>Resumen</h6><div class="para">
 			La Guía de Seguridad Linux está diseñada para asistir a usuarios de Linux en el proceso de aprendizaje y en la realización de prácticas de seguridad en estaciones de trabajo y servidores, para poder así evitar intrusiones locales y remotas, explotaciones, y actividades maliciosas. La Guía de Seguridad Linux detalla la planificación y describe las herramientas involucradas en la creación de un entorno de computación seguro, ya sea para centros de datos, estaciones de trabajo, o el hogar. Con un conocimiento administrativo apropiado, vigilancia, y herramientas, los sistemas ejecutando Linux pueden ser funcionales y al mismo tiempo seguros, frente a los métodos de intrusión y explotación mas comunes.
-		</div></div></div></div><hr /></div><div class="toc"><dl><dt><span class="preface"><a href="#pref-Security_Guide-Preface">Prefacio</a></span></dt><dd><dl><dt><span class="section"><a href="#id1247205">1. Convenciones del Documento</a></span></dt><dd><dl><dt><span class="section"><a href="#id1247194">1.1. Convenciones Tipográficas</a></span></dt><dt><span class="section"><a href="#id1345369">1.2. Convenciones del documento</a></span></dt><dt><span class="section"><a href="#id1406041">1.3. Notas y Advertencias</a></span></dt></dl></dd><dt><span class="section"><a href="#We_Need_Feedback">2. ¡Necesitamos sus comentarios!</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Security_Overview">1. Repaso sobre seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security">1.1. Introducción a la Seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to
 _Security-What_is_Computer_Security">1.1.1. ¿Qué es la seguridad en computación?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Controles de seguridad</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusión</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment">1.2. Evaluación de debilidades</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Pensando como el enemigo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing">1.2.2. Definiendo evaluación y pruebas</a></span></dt><dt><span class="section"><a 
 href="#sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools">1.2.3. Herramientas de evaluación</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities">1.3. Atacantes y vulnerabilidades</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Una breve reseña acerca de los hackers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security">1.3.2. Amenazas a la seguridad de la red</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security">1.3.3. Amenazas a la seguridad del servidor</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security">1.3.4. Amenazas a las estaciones de trabajo y seguridad en e
 quipos hogareños</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Common_Exploits_and_Attacks">1.4. Ataques y debilidades comunes</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates">1.5. Actualizaciones de seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Actualización de paquetes</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages">1.5.2. Verificación de paquetes firmados</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Installing_Signed_Packages">1.5.3. Instalación de paquetes firmados</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Applying_the_Changes">1.5.4. Aplicación de los cambios</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Se
 curing_Your_Network">2. Asegurando su Red</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security">2.1. Seguridad de la estación de trabajo</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Evaluación de la seguridad de la estación de trabajo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. Seguridad en el BIOS y en el gestor de arranque</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Seguridad de contraseñas</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Controles administrativos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Servicios 
 de red disponibles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Cortafuegos personales</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Herramientas de comunicación de seguridad mejorada</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Server_Security">2.2. Seguridad del servidor</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Asegurando los servicios con encapsuladores TCP y xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Portmap">2.2.2. Asegurando Portmap</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NIS">2.2.3. Asegurando NIS</a></span></dt><dt><span class="section"><a href="#
 sect-Security_Guide-Server_Security-Securing_NFS">2.2.4. Asegurando NFS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">2.2.5. Asegurando el servidor HTTP Apache</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_FTP">2.2.6. Asegurando FTP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Sendmail">2.2.7. Asegurando Sendmail</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">2.2.8. Verificar qué puertos están abiertos</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO">2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Introducción</a></span></d
 t><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card">2.3.2. Empezar a utilizar su nueva tarjeta inteligente</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">2.3.4. Cómo funciona el ingreso con tarjeta inteligente</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">2.3.5. Configurar Firefox para la utilización de Kerberos como SSO</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM">2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)</a></span></
 dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Ventajas de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">2.4.2. Archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">2.4.3. Formato del archivo de configuración de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">2.4.4. Ejemplos de archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">2.4.5. Creación de los módulos PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Ad
 ministrative_Credential_Caching">2.4.6. PAM y el cacheo de la credencial administrativa</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">2.4.7. PAM y la propiedad de los dispositivos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">2.4.8. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd">2.5. Encapsuladores TCP y xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. Encapsuladores TCP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files">2.5.2. Archivos de configuración de los encapsuladores TCP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xine
 td-xinetd">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">2.5.4. Archivos de configuración de xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources">2.5.5. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Kerberos">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. ¿Qué es Kerberos?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_Terminology">2.6.2. Terminología de Kerberos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-How_Kerberos_Works">2.6.3. Como Funciona Kerberos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_and_PAM">2.6.4. Kerberos y PAM</a></span></dt><dt><span clas
 s="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server">2.6.5. Configurando un servidor Kerberos 5</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">2.6.6. Configuración de un Cliente Kerberos 5</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">2.6.7. Mapeo dominio-a-reinado</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">2.6.8. Configurando KDCs secundarios</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">2.6.9. Configurando la autenticación cruzada de reinados</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Additional_Resources">2.6.10. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs">2.
 7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. ¿Cómo funciona una VPN?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD">2.7.2. VPNs y Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection">2.7.4. Creando una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation">2.7.5. Instalación de IPsec</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configurati
 on">2.7.6. Configuración de IPsec equipo-a-equipo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration">2.7.7. Configuración IPsec red-a-red</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection">2.7.8. Iniciar y detener una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Firewalls">2.8. Cortafuegos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter e IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Basic_Firewall_Configuration">2.8.2. Configuración básica de un cortafuego</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Using_IPTables">2.8.3. Uso de IPTables</a></span></dt
 ><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Common_IPTables_Filtering">2.8.4. Filtrado común de IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules">2.8.5. Reglas <code class="computeroutput">FORWARD</code> y <acronym class="acronym">NAT</acronym></a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses">2.8.6. Software malicioso y suplantación de direcciones IP </a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking">2.8.7. IPTables y el seguimiento de la conexión</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPv6">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Additional_Resources">2.8.9. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_G
 uide-IPTables">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Filtrado de Paquete</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains">2.9.2. Diferencias entre IPTables e IPChains</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Command_Options_for_IPTables">2.9.3. Opciones de la línea de comandos de IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Saving_IPTables_Rules">2.9.4. Guardando las reglas de IPTalbes</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_Control_Scripts">2.9.5. Programas de control de IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_and_IPv6">2.9.6. IPTables e IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Addit
 ional_Resources">2.9.7. Recursos adicionales</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Encryption">3. Encriptación</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Datos en reposo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption">3.2. Encriptación completa del disco</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">3.3. Encriptación basada en archivo</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion">3.4. Datos en movimiento</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks">3.5. Redes privadas virtuales (VPNs)</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Secure_
 Shell">3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption">3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. Implementación de LUKS en Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories">3.7.2. Encriptación manual de directorios</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions">3.7.3. Instrucciones paso a paso</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished">3.7.4. Lo que acaba de realizar</a></span></dt><dt><span class="
 section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest">3.7.5. Enlaces de interés</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives">3.8. Archivos Encriptados 7-Zip</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. Instalación de 7-Zip en Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions">3.8.2. Instrucciones paso a paso para su instalación</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions">3.8.3. Instrucciones paso a paso para su utilización</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note">3.8.4. Elementos para prestar atención</a></span></dt></dl></dd><dt><spa
 n class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG">3.9. Utilizando GNU Privacy Guard (GnuPG)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Crear claves GPG en GNOME</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1">3.9.2. Crear claves GPG en KDE</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE">3.9.3. Crear una clave GPG mediante la línea de comandos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption">3.9.4. Acerca del encriptado de la clave pública</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-General_Principles_of_Information_Security">4. Principios Generales sobre la Seguridad de la Información</a></span></dt><dd><dl><dt><span cl
 ass="section"><a href="#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Consejos, Guías y Herramientas</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Secure_Installation">5. Instalación segura</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Particiones del disco</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption">5.2. Utilice encriptado de particiones mediante LUKS</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Software_Maintenance">6. Mantenimiento de Software</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Instale el software mínimo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Con
 figure_Security_Updates">6.2. Planifique y configure actualizaciones de seguridad</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates">6.3. Ajustando las actualizaciones automáticas</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories">6.4. Instale paquetes identificados desde repositorios conocidos</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-References">7. Referencias</a></span></dt></dl></div><div xml:lang="es-ES" class="preface" title="Prefacio" id="pref-Security_Guide-Preface" lang="es-ES"><div class="titlepage"><div><div><h1 class="title">Prefacio</h1></div></div></div><div xml:lang="es-ES" class="section" title="1. Convenciones del Documento" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="titl
 e" id="id1247205">1. Convenciones del Documento</h2></div></div></div><div class="para">
+		</div></div></div></div><hr /></div><div class="toc"><dl><dt><span class="preface"><a href="#pref-Security_Guide-Preface">Prefacio</a></span></dt><dd><dl><dt><span class="section"><a href="#id1164525">1. Convenciones del Documento</a></span></dt><dd><dl><dt><span class="section"><a href="#id1164515">1.1. Convenciones Tipográficas</a></span></dt><dt><span class="section"><a href="#id1138538">1.2. Convenciones del documento</a></span></dt><dt><span class="section"><a href="#id1242155">1.3. Notas y Advertencias</a></span></dt></dl></dd><dt><span class="section"><a href="#We_Need_Feedback">2. ¡Necesitamos sus comentarios!</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Security_Overview">1. Repaso sobre seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security">1.1. Introducción a la Seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to
 _Security-What_is_Computer_Security">1.1.1. ¿Qué es la seguridad en computación?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Controles de seguridad</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusión</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment">1.2. Evaluación de debilidades</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Pensando como el enemigo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing">1.2.2. Definiendo evaluación y pruebas</a></span></dt><dt><span class="section"><a 
 href="#sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools">1.2.3. Herramientas de evaluación</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities">1.3. Atacantes y vulnerabilidades</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Una breve reseña acerca de los hackers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security">1.3.2. Amenazas a la seguridad de la red</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security">1.3.3. Amenazas a la seguridad del servidor</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security">1.3.4. Amenazas a las estaciones de trabajo y seguridad en e
 quipos hogareños</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Common_Exploits_and_Attacks">1.4. Ataques y debilidades comunes</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates">1.5. Actualizaciones de seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Actualización de paquetes</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages">1.5.2. Verificación de paquetes firmados</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Installing_Signed_Packages">1.5.3. Instalación de paquetes firmados</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Applying_the_Changes">1.5.4. Aplicación de los cambios</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Se
 curing_Your_Network">2. Asegurando su Red</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security">2.1. Seguridad de la estación de trabajo</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Evaluación de la seguridad de la estación de trabajo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. Seguridad en el BIOS y en el gestor de arranque</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Seguridad de contraseñas</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Controles administrativos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Servicios 
 de red disponibles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Cortafuegos personales</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Herramientas de comunicación de seguridad mejorada</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Server_Security">2.2. Seguridad del servidor</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Asegurando los servicios con encapsuladores TCP y xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Portmap">2.2.2. Asegurando Portmap</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NIS">2.2.3. Asegurando NIS</a></span></dt><dt><span class="section"><a href="#
 sect-Security_Guide-Server_Security-Securing_NFS">2.2.4. Asegurando NFS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">2.2.5. Asegurando el servidor HTTP Apache</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_FTP">2.2.6. Asegurando FTP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Sendmail">2.2.7. Asegurando Sendmail</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">2.2.8. Verificar qué puertos están abiertos</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO">2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Introducción</a></span></d
 t><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card">2.3.2. Empezar a utilizar su nueva tarjeta inteligente</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">2.3.4. Cómo funciona el ingreso con tarjeta inteligente</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">2.3.5. Configurar Firefox para la utilización de Kerberos como SSO</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM">2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)</a></span></
 dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Ventajas de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">2.4.2. Archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">2.4.3. Formato del archivo de configuración de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">2.4.4. Ejemplos de archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">2.4.5. Creación de los módulos PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Ad
 ministrative_Credential_Caching">2.4.6. PAM y el cacheo de la credencial administrativa</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">2.4.7. PAM y la propiedad de los dispositivos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">2.4.8. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd">2.5. Encapsuladores TCP y xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. Encapsuladores TCP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files">2.5.2. Archivos de configuración de los encapsuladores TCP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xine
 td-xinetd">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">2.5.4. Archivos de configuración de xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources">2.5.5. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Kerberos">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. ¿Qué es Kerberos?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_Terminology">2.6.2. Terminología de Kerberos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-How_Kerberos_Works">2.6.3. Como Funciona Kerberos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_and_PAM">2.6.4. Kerberos y PAM</a></span></dt><dt><span clas
 s="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server">2.6.5. Configurando un servidor Kerberos 5</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">2.6.6. Configuración de un Cliente Kerberos 5</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">2.6.7. Mapeo dominio-a-reinado</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">2.6.8. Configurando KDCs secundarios</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">2.6.9. Configurando la autenticación cruzada de reinados</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Additional_Resources">2.6.10. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs">2.
 7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. ¿Cómo funciona una VPN?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD">2.7.2. VPNs y Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection">2.7.4. Creando una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation">2.7.5. Instalación de IPsec</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configurati
 on">2.7.6. Configuración de IPsec equipo-a-equipo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration">2.7.7. Configuración IPsec red-a-red</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection">2.7.8. Iniciar y detener una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Firewalls">2.8. Cortafuegos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter e IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Basic_Firewall_Configuration">2.8.2. Configuración básica de un cortafuego</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Using_IPTables">2.8.3. Uso de IPTables</a></span></dt
 ><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Common_IPTables_Filtering">2.8.4. Filtrado común de IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules">2.8.5. Reglas <code class="computeroutput">FORWARD</code> y <acronym class="acronym">NAT</acronym></a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses">2.8.6. Software malicioso y suplantación de direcciones IP </a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking">2.8.7. IPTables y el seguimiento de la conexión</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPv6">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Additional_Resources">2.8.9. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_G
 uide-IPTables">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Filtrado de Paquete</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains">2.9.2. Diferencias entre IPTables e IPChains</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Command_Options_for_IPTables">2.9.3. Opciones de la línea de comandos de IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Saving_IPTables_Rules">2.9.4. Guardando las reglas de IPTalbes</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_Control_Scripts">2.9.5. Programas de control de IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_and_IPv6">2.9.6. IPTables e IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Addit
 ional_Resources">2.9.7. Recursos adicionales</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Encryption">3. Encriptación</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Datos en reposo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption">3.2. Encriptación completa del disco</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">3.3. Encriptación basada en archivo</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion">3.4. Datos en movimiento</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks">3.5. Redes privadas virtuales (VPNs)</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Secure_
 Shell">3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption">3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. Implementación de LUKS en Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories">3.7.2. Encriptación manual de directorios</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions">3.7.3. Instrucciones paso a paso</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished">3.7.4. Lo que acaba de realizar</a></span></dt><dt><span class="
 section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest">3.7.5. Enlaces de interés</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives">3.8. Archivos Encriptados 7-Zip</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. Instalación de 7-Zip en Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions">3.8.2. Instrucciones paso a paso para su instalación</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions">3.8.3. Instrucciones paso a paso para su utilización</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note">3.8.4. Elementos para prestar atención</a></span></dt></dl></dd><dt><spa
 n class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG">3.9. Utilizando GNU Privacy Guard (GnuPG)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Crear claves GPG en GNOME</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1">3.9.2. Crear claves GPG en KDE</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE">3.9.3. Crear una clave GPG mediante la línea de comandos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption">3.9.4. Acerca del encriptado de la clave pública</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-General_Principles_of_Information_Security">4. Principios Generales sobre la Seguridad de la Información</a></span></dt><dd><dl><dt><span cl
 ass="section"><a href="#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Consejos, Guías y Herramientas</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Secure_Installation">5. Instalación segura</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Particiones del disco</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption">5.2. Utilice encriptado de particiones mediante LUKS</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Software_Maintenance">6. Mantenimiento de Software</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Instale el software mínimo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Con
 figure_Security_Updates">6.2. Planifique y configure actualizaciones de seguridad</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates">6.3. Ajustando las actualizaciones automáticas</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories">6.4. Instale paquetes identificados desde repositorios conocidos</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-References">7. Referencias</a></span></dt></dl></div><div xml:lang="es-ES" class="preface" title="Prefacio" id="pref-Security_Guide-Preface" lang="es-ES"><div class="titlepage"><div><div><h1 class="title">Prefacio</h1></div></div></div><div xml:lang="es-ES" class="section" title="1. Convenciones del Documento" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="titl
 e" id="id1164525">1. Convenciones del Documento</h2></div></div></div><div class="para">
 		Este manual utiliza varias convenciones para resaltar algunas palabras y frases y llamar la atención sobre ciertas partes específicas de información.
 	</div><div class="para">
 		En ediciones PDF y de papel, este manual utiliza tipos de letra procedentes de <a href="https://fedorahosted.org/liberation-fonts/">Liberation Fonts</a>. Liberation Fonts también se utilizan en ediciones de HTML si están instalados en su sistema. Si no, se muestran tipografías alternativas pero equivalentes. Nota: Red Hat Enterprise Linux 5 y siguientes incluyen Liberation Fonts predeterminadas.
-	</div><div class="section" title="1.1. Convenciones Tipográficas"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1247194">1.1. Convenciones Tipográficas</h3></div></div></div><div class="para">
+	</div><div class="section" title="1.1. Convenciones Tipográficas"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1164515">1.1. Convenciones Tipográficas</h3></div></div></div><div class="para">
 			Se utilizan cuatro convenciones tipográficas para llamar la atención sobre palabras o frases específicas. Dichas convenciones y las circunstancias en que se aplican son las siguientes:
 		</div><div class="para">
 			<code class="literal">Negrita monoespaciado</code>
@@ -75,7 +75,7 @@
 			Aparte del uso estándar para presentar el título de un trabajo, las itálicas denotan el primer uso de un término nuevo e importante. Por ejemplo:
 		</div><div class="blockquote"><blockquote class="blockquote"><div class="para">
 				Publican es un sistema de publicación de <em class="firstterm">DocBook</em>.
-			</div></blockquote></div></div><div class="section" title="1.2. Convenciones del documento"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1345369">1.2. Convenciones del documento</h3></div></div></div><div class="para">
+			</div></blockquote></div></div><div class="section" title="1.2. Convenciones del documento"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1138538">1.2. Convenciones del documento</h3></div></div></div><div class="para">
 			Los mensajes de salida de la terminal o fragmentos de código fuente se distinguen visualmente del texto circundante.
 		</div><div class="para">
 			Los mensajes de salida enviados a una terminal se muestran en <code class="computeroutput">romano monoespaciado</code> y se presentan así:
@@ -104,7 +104,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs
    }
 }
 
-</pre></div><div class="section" title="1.3. Notas y Advertencias"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1406041">1.3. Notas y Advertencias</h3></div></div></div><div class="para">
+</pre></div><div class="section" title="1.3. Notas y Advertencias"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1242155">1.3. Notas y Advertencias</h3></div></div></div><div class="para">
 			Finalmente, utilizamos tres estilos visuales para llamar la atención sobre la información que de otro modo se podría pasar por alto.
 		</div><div class="note"><h2>Nota</h2><div class="para">
 				Una nota es una sugerencia, atajo o enfoque alternativo para una tarea determinada. Ignorar una nota no debería tener consecuencias negativas, pero podría perderse de algunos trucos que pueden facilitarle las cosas.
@@ -123,7 +123,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs
 	</div><div xml:lang="es-ES" class="section" title="1.1. Introducción a la Seguridad" id="sect-Security_Guide-Introduction_to_Security" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.1. Introducción a la Seguridad</h2></div></div></div><div class="section" title="1.1.1. ¿Qué es la seguridad en computación?" id="sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.1.1. ¿Qué es la seguridad en computación?</h3></div></div></div><div class="para">
 			La noción de seguridad en computación es un concepto general que cubre un área muy extensa dentro del ámbito de la computación y del procesamiento de la información. Las industrias que dependen tanto de redes como de sistemas de computación para poder realizar cotidianamente operaciones comerciales, o para acceder a diverso tipo de información vital, entienden que sus datos son una parte importante de sus activos. Han ingresado a nuestro vocabulario cotidiano diversos términos y unidades de medición pertenecientes al ámbito comercial, como ser por ejemplo, el coste total de propiedad (TCO, por las iniciales en inglés de Total Cost of Ownership), o servicio de calidad (QoS, por las iniciales en inglés de Quality of Service). Al utilizar estas unidades, las industrias pueden calcular aspectos tales como ser la integridad de los datos, o el tipo de disponibilidad que tienen, y poder considerarlos parte de los costos de planeamiento y administración de procesos.
  En algunas industrias, como la del comercio electrónico por ejemplo, el tipo de disponibilidad y la confiabilidad de los datos puede ser un elemento determinante para el éxito o el fracaso.
 		</div><div class="section" title="1.1.1.1. ¿De dónde viene la idea de seguridad en computación?" id="sect-Security_Guide-What_is_Computer_Security-How_did_Computer_Security_Come_about"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.1. ¿De dónde viene la idea de seguridad en computación?</h4></div></div></div><div class="para">
-				La seguridad en la información ha evolucionado con el correr de los años debido al aumento en la utilización de redes públicas y el consecuente riesgo de exposición que en ellas tienen los datos privados, confidenciales o financieros. Existen numerosos antecedentes, como el caso Mitnick <sup>[<a id="id1398039" href="#ftn.id1398039" class="footnote">1</a>]</sup> o Vladimir Levin <sup>[<a id="id1395347" href="#ftn.id1395347" class="footnote">2</a>]</sup>, que sugieren a todas las organizaciones de cualquier tipo de industria, replantearse la forma en que tienen organizado el manejo de su propia información, o de la manera en que es transmitida y revelada. La popularidad que tiene Internet es uno de los motivos fundamentales gracias al cual se han intensificado los esfuerzos relacionados con la seguridad en los datos.
+				La seguridad en la información ha evolucionado con el correr de los años debido al aumento en la utilización de redes públicas y el consecuente riesgo de exposición que en ellas tienen los datos privados, confidenciales o financieros. Existen numerosos antecedentes, como el caso Mitnick <sup>[<a id="id1313943" href="#ftn.id1313943" class="footnote">1</a>]</sup> o Vladimir Levin <sup>[<a id="id1171448" href="#ftn.id1171448" class="footnote">2</a>]</sup>, que sugieren a todas las organizaciones de cualquier tipo de industria, replantearse la forma en que tienen organizado el manejo de su propia información, o de la manera en que es transmitida y revelada. La popularidad que tiene Internet es uno de los motivos fundamentales gracias al cual se han intensificado los esfuerzos relacionados con la seguridad en los datos.
 			</div><div class="para">
 				Un número creciente de personas está utilizando sus computadoras personales para obtener acceso a los recursos que ofrece Internet. Desde investigación y obtención de información hasta el correo electrónico y transacciones comerciales, Internet es considerada como uno de los desarrollos más importantes del siglo 20.
 			</div><div class="para">
@@ -131,19 +131,19 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs
 			</div></div><div class="section" title="1.1.1.2. La seguridad hoy" id="sect-Security_Guide-What_is_Computer_Security-Security_Today"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.2. La seguridad hoy</h4></div></div></div><div class="para">
 				En febrero del año 2000 un ataque de denegación de servicio distribuido (DDoS, por las iniciales en inglés de Distributed Denial of Service) fue liberado sobre varios de los sitios de Internet que tenían más tráfico. Este ataque afectó a yahoo.com, cnn.com, amazon.com, fbi.gov y algunos otros sitios que son completamente inaccesibles para los usuarios normales, dejando a los enrutadores bloqueados durante varias horas con transferencias de grandes paquetes ICMP, o también denominado un <em class="firstterm">ping de la muerte</em>. El ataque fue llevado a cabo por asaltantes desconocidos utilizando programas especialmente creados (y que están a disposición de cualquiera), que buscan servidores de red vulnerables, instalan en esos servidores aplicaciones de cliente denominadas <em class="firstterm">troyanos</em>, y sincronizando un ataque con cada servidor infectado, inundando los sitios elegidos y dejándolos inutilizables. Muchos adjudican el éxito del ataque 
 a fallas fundamentales en la forma en que están estructurados los enrutadores y los protocolos que utilizan. Estas fallas tienen que ver con la manera en que se aceptan los datos entrantes, sin importar desde dónde provengan, o con qué propósito los paquetes hayan sido enviados.
 			</div><div class="para">
-				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<sup>[<a id="id1341540" href="#ftn.id1341540" class="footnote">3</a>]</sup>
+				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<sup>[<a id="id1246506" href="#ftn.id1246506" class="footnote">3</a>]</sup>
 			</div><div class="para">
-				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<sup>[<a id="id1389750" href="#ftn.id1389750" class="footnote">4</a>]</sup>
+				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<sup>[<a id="id1181283" href="#ftn.id1181283" class="footnote">4</a>]</sup>
 			</div><div class="para">
-				Actualmente, se estima que 1,4 mil millones de personas usan o usaron Internet alrededor del mundo <sup>[<a id="id1253829" href="#ftn.id1253829" class="footnote">5</a>]</sup>. Al mismo tiempo:
+				Actualmente, se estima que 1,4 mil millones de personas usan o usaron Internet alrededor del mundo <sup>[<a id="id1288163" href="#ftn.id1288163" class="footnote">5</a>]</sup>. Al mismo tiempo:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<sup>[<a id="id1270640" href="#ftn.id1270640" class="footnote">6</a>]</sup>
+						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<sup>[<a id="id1139936" href="#ftn.id1139936" class="footnote">6</a>]</sup>
 					</div></li><li class="listitem"><div class="para">
-						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<sup>[<a id="id1270739" href="#ftn.id1270739" class="footnote">7</a>]</sup>
+						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<sup>[<a id="id1293862" href="#ftn.id1293862" class="footnote">7</a>]</sup>
 					</div></li><li class="listitem"><div class="para">
-						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<sup>[<a id="id1284000" href="#ftn.id1284000" class="footnote">8</a>]</sup>
+						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<sup>[<a id="id1294974" href="#ftn.id1294974" class="footnote">8</a>]</sup>
 					</div></li></ul></div><div class="para">
-				From a 2008 global survey of business and technology executives "The Global State of Information Security"<sup>[<a id="id1344501" href="#ftn.id1344501" class="footnote">9</a>]</sup>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
+				From a 2008 global survey of business and technology executives "The Global State of Information Security"<sup>[<a id="id1280139" href="#ftn.id1280139" class="footnote">9</a>]</sup>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Sólo el 43% de los encuestados audita o monitorea el cumplimiento de las políticas de seguridad de sus usuarios
 					</div></li><li class="listitem"><div class="para">
@@ -376,7 +376,7 @@ PORT    STATE  SERVICE
 			</div><div class="para">
 				Refer to <a class="xref" href="#sect-Security_Guide-Security_Updates" title="1.5. Actualizaciones de seguridad">Sección 1.5, “Actualizaciones de seguridad”</a> for more information about keeping a system up-to-date.
 			</div></div><div class="section" title="1.3.3.3. Administración desatendida" id="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.3.3. Administración desatendida</h4></div></div></div><div class="para">
-				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<sup>[<a id="id1369702" href="#ftn.id1369702" class="footnote">10</a>]</sup> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
+				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<sup>[<a id="id1192801" href="#ftn.id1192801" class="footnote">10</a>]</sup> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
 			</div><div class="para">
 				Alguno administradores no pueden enmendar sus servidores o estaciones de trabajo, y otros no le prestan atención a los mensajes de registro enviados desde el kernel del sistema, o generados por el tráfico en la red. Otro error común se produce al no modificar las contraseñas o claves establecidas por defecto para los servicios. Por ejemplo, algunas bases de datos tienen contraseñas administrativas generadas por defecto, debido a que los desarrolladores de las bases de datos presuponen que el administrador del sistema las modificará inmediatamente después de haberla instalado en su sistema. Si un administrador de una base de datos no cambia la contraseña, incluso un atacante sin demasiada experiencia puede utilizar una amplia gama de contraseñas que se sabe le pueden otorgar privilegios de administrador en esa base de datos. Estos son sólo algunos ejemplos que ilustran de qué manera una administración débil puede ocasionar la vulnerabilidad de los servidores.
 			</div></div><div class="section" title="1.3.3.4. Servicios inseguros en sí mismos" id="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.3.4. Servicios inseguros en sí mismos</h4></div></div></div><div class="para">
@@ -550,25 +550,25 @@ PORT    STATE  SERVICE
 					</div><div class="para">
 						Para detener todas las sesiones IMAP activas, ingrese el siguiente comando:
 					</div><pre class="screen"><code class="command">killall imapd</code>
-</pre></dd></dl></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div class="footnote"><p><sup>[<a id="ftn.id1398039" href="#id1398039" class="para">1</a>] </sup>
+</pre></dd></dl></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div class="footnote"><p><sup>[<a id="ftn.id1313943" href="#id1313943" class="para">1</a>] </sup>
 					http://law.jrank.org/pages/3791/Kevin-Mitnick-Case-1999.html
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1395347" href="#id1395347" class="para">2</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1171448" href="#id1171448" class="para">2</a>] </sup>
 					http://www.livinginternet.com/i/ia_hackers_levin.htm
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1341540" href="#id1341540" class="para">3</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1246506" href="#id1246506" class="para">3</a>] </sup>
 					http://www.theregister.co.uk/2007/05/04/txj_nonfeasance/
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1389750" href="#id1389750" class="para">4</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1181283" href="#id1181283" class="para">4</a>] </sup>
 					http://www.healthcareitnews.com/story.cms?id=9408
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1253829" href="#id1253829" class="para">5</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1288163" href="#id1288163" class="para">5</a>] </sup>
 					http://www.internetworldstats.com/stats.htm
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1270640" href="#id1270640" class="para">6</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1139936" href="#id1139936" class="para">6</a>] </sup>
 							http://www.cert.org
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1270739" href="#id1270739" class="para">7</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1293862" href="#id1293862" class="para">7</a>] </sup>
 							http://www.cert.org/stats/fullstats.html
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1284000" href="#id1284000" class="para">8</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1294974" href="#id1294974" class="para">8</a>] </sup>
 							http://www.newsfactor.com/perl/story/16407.html
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1344501" href="#id1344501" class="para">9</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1280139" href="#id1280139" class="para">9</a>] </sup>
 					http://www.csoonline.com/article/454939/The_Global_State_of_Information_Security_
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1369702" href="#id1369702" class="para">10</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1192801" href="#id1192801" class="para">10</a>] </sup>
 					http://www.sans.org/resources/errors.php
 				</p></div></div></div><div xml:lang="es-ES" class="chapter" title="Capítulo 2. Asegurando su Red" id="chap-Security_Guide-Securing_Your_Network" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 2. Asegurando su Red</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security">2.1. Seguridad de la estación de trabajo</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Evaluación de la seguridad de la estación de trabajo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. Seguridad en el BIOS y en el gestor de arranque</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Seguridad de contraseñas</a></span></dt><dt><span class="section"><a href="#sect-Security
 _Guide-Workstation_Security-Administrative_Controls">2.1.4. Controles administrativos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Servicios de red disponibles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Cortafuegos personales</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Herramientas de comunicación de seguridad mejorada</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Server_Security">2.2. Seguridad del servidor</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Asegurando los servicios con encapsuladores TCP y xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Secu
 rity-Securing_Portmap">2.2.2. Asegurando Portmap</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NIS">2.2.3. Asegurando NIS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NFS">2.2.4. Asegurando NFS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">2.2.5. Asegurando el servidor HTTP Apache</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_FTP">2.2.6. Asegurando FTP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Sendmail">2.2.7. Asegurando Sendmail</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">2.2.8. Verificar qué puertos están abiertos</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO">2.3. 
 Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Introducción</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card">2.3.2. Empezar a utilizar su nueva tarjeta inteligente</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">2.3.4. Cómo funciona el ingreso con tarjeta inteligente</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">2.3.5. Configurar Firefox para la utilización de Kerberos como SSO</a></span></dt></dl></dd
 ><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM">2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Ventajas de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">2.4.2. Archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">2.4.3. Formato del archivo de configuración de PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">2.4.4. Ejemplos de archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="#sect-Securi
 ty_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">2.4.5. Creación de los módulos PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching">2.4.6. PAM y el cacheo de la credencial administrativa</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">2.4.7. PAM y la propiedad de los dispositivos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">2.4.8. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd">2.5. Encapsuladores TCP y xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. Encapsuladores TCP</a></span></dt><dt><span class="section"><a href="#sect-Se
 curity_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files">2.5.2. Archivos de configuración de los encapsuladores TCP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">2.5.4. Archivos de configuración de xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources">2.5.5. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Kerberos">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. ¿Qué es Kerberos?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_Terminology">2.6.2. Terminología de Kerberos</a></span></dt><dt><span class="section"><a href="#sect-
 Security_Guide-Kerberos-How_Kerberos_Works">2.6.3. Como Funciona Kerberos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_and_PAM">2.6.4. Kerberos y PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server">2.6.5. Configurando un servidor Kerberos 5</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">2.6.6. Configuración de un Cliente Kerberos 5</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">2.6.7. Mapeo dominio-a-reinado</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">2.6.8. Configurando KDCs secundarios</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">2.6.9. Configurando la autenticación cruzada de reinados</a></span></dt><dt><sp
 an class="section"><a href="#sect-Security_Guide-Kerberos-Additional_Resources">2.6.10. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs">2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. ¿Cómo funciona una VPN?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD">2.7.2. VPNs y Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection">2.7.4. Creando una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt><dt><span class="section"><a href="#sect-Se
 curity_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation">2.7.5. Instalación de IPsec</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration">2.7.6. Configuración de IPsec equipo-a-equipo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration">2.7.7. Configuración IPsec red-a-red</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection">2.7.8. Iniciar y detener una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Firewalls">2.8. Cortafuegos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter e IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guid
 e-Firewalls-Basic_Firewall_Configuration">2.8.2. Configuración básica de un cortafuego</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Using_IPTables">2.8.3. Uso de IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Common_IPTables_Filtering">2.8.4. Filtrado común de IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules">2.8.5. Reglas <code class="computeroutput">FORWARD</code> y <acronym class="acronym">NAT</acronym></a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses">2.8.6. Software malicioso y suplantación de direcciones IP </a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking">2.8.7. IPTables y el seguimiento de la conexión</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IP
 v6">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Additional_Resources">2.8.9. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-IPTables">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Filtrado de Paquete</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains">2.9.2. Diferencias entre IPTables e IPChains</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Command_Options_for_IPTables">2.9.3. Opciones de la línea de comandos de IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Saving_IPTables_Rules">2.9.4. Guardando las reglas de IPTalbes</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_Control_Scripts">2.9.5. Programas de cont
 rol de IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_and_IPv6">2.9.6. IPTables e IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Additional_Resources">2.9.7. Recursos adicionales</a></span></dt></dl></dd></dl></div><div xml:lang="es-ES" class="section" title="2.1. Seguridad de la estación de trabajo" id="sect-Security_Guide-Workstation_Security" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.1. Seguridad de la estación de trabajo</h2></div></div></div><div class="para">
 		Asegurar un entorno Linux comienza con la estación de trabajo. Ya sea bloqueando una máquina personal, o asegurando un sistema corporativo, cualquier política de seguridad empieza con la computadora individual. La seguridad de una red de computadoras es la misma que la de su nodo más débil.
@@ -593,7 +593,7 @@ PORT    STATE  SERVICE
 		</div><div class="para">
 			Por otro lado, si la estación de trabajo se encuentra ubicada en un lugar al cuál tienen acceso solo personas autorizadas o de confianza, en ese caso asegurar el BIOS o el gestor de arranque podría no ser necesario.
 		</div><div class="section" title="2.1.2.1. Contraseña BIOS" id="sect-Security_Guide-BIOS_and_Boot_Loader_Security-BIOS_Passwords"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.1.2.1. Contraseña BIOS</h4></div></div></div><div class="para">
-				Las dos razones fundamentales para proteger con una contraseña el BIOS de una computadora son <sup>[<a id="id1438905" href="#ftn.id1438905" class="footnote">11</a>]</sup>:
+				Las dos razones fundamentales para proteger con una contraseña el BIOS de una computadora son <sup>[<a id="id1338926" href="#ftn.id1338926" class="footnote">11</a>]</sup>:
 			</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Evitar modificaciones a la configuración del BIOS</em></span> — Si un intruso tiene acceso al BIOS, puede configurarlo para iniciarse desde un diskette o CD-ROM. Esto hace que sea posible para él ingresar en modo rescate o en modo de único usuario, lo que a su vez permite que inicie procesos a elección en el sistema, o que pueda copiar información importante.
 					</div></li><li class="listitem"><div class="para">
@@ -625,7 +625,7 @@ PORT    STATE  SERVICE
 					A continuación, edite el archivo de configuración del GRUB <code class="filename">/boot/grub/grub.conf</code>. Abra el archivo y debajo de la línea <code class="command">timeout</code> en la sección principal del documento, añada la siguiente:
 				</div><pre class="screen"><code class="command">password --md5 <em class="replaceable"><code>&lt;password-hash&gt;</code></em></code>
 </pre><div class="para">
-					Replace <em class="replaceable"><code>&lt;password-hash&gt;</code></em> with the value returned by <code class="command">/sbin/grub-md5-crypt</code><sup>[<a id="id1438685" href="#ftn.id1438685" class="footnote">12</a>]</sup>.
+					Replace <em class="replaceable"><code>&lt;password-hash&gt;</code></em> with the value returned by <code class="command">/sbin/grub-md5-crypt</code><sup>[<a id="id1338705" href="#ftn.id1338705" class="footnote">12</a>]</sup>.
 				</div><div class="para">
 					La próxima vez que el sistema sea iniciado, el menú del GRUB evitará que se ingrese al editor, o a la interfaz de comandos, sin haber presionado primero la tecla <span class="keycap"><strong>p</strong></span>, seguida de la contraseña del GRUB
 				</div><div class="para">
@@ -884,14 +884,14 @@ Account Expiration Date (YYYY-MM-DD) [1969-12-31]:
 							</td></tr><tr><td>
 								Utilice PAM para limitar el acceso root a los servicios.
 							</td><td>
-								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<sup>[<a id="id1434637" href="#ftn.id1434637" class="footnote">a</a>]</sup>
+								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<sup>[<a id="id1334677" href="#ftn.id1334677" class="footnote">a</a>]</sup>
 							</td><td>
 								<table border="0" summary="Simple list" class="simplelist"><tr><td>Previene el acceso root a los servicios de red que son compatibles com PAM.</td></tr><tr><td>Los siguientes servcicios son prevenidos al intentar acceder a la cuenta de root:</td></tr><tr><td>· Clientes de FTP</td></tr><tr><td>· Clientes de correo</td></tr><tr><td>· <code class="command">login</code></td></tr><tr><td>· <code class="command">gdm</code></td></tr><tr><td>· <code class="command">kdm</code></td></tr><tr><td>· <code class="command">xdm</code></td></tr><tr><td>· <code class="command">ssh</code></td></tr><tr><td>· <code class="command">scp</code></td></tr><tr><td>· <code class="command">sftp</code></td></tr><tr><td>· Cualquier servicio PAM</td></tr></table>
 
 							</td><td>
 								<table border="0" summary="Simple list" class="simplelist"><tr><td>Programas y servicios que no son compatibles con PAM.</td></tr></table>
 
-							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div class="footnote"><p><sup>[<a id="ftn.id1434637" href="#id1434637" class="para">a</a>] </sup>
+							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div class="footnote"><p><sup>[<a id="ftn.id1334677" href="#id1334677" class="para">a</a>] </sup>
 									Refer to <a class="xref" href="#sect-Security_Guide-Disallowing_Root_Access-Disabling_Root_Using_PAM" title="2.1.4.2.4. Deshabilitando root usando PAM">Sección 2.1.4.2.4, “Deshabilitando root usando PAM”</a> for details.
 								</p></div></td></tr></tbody></table></div><h6>Tabla 2.1. Métodos para deshabilitar la cuenta root</h6></div><br class="table-break" /><div class="section" title="2.1.4.2.1. Deshabilitando la cuenta shell de root" id="sect-Security_Guide-Disallowing_Root_Access-Disabling_the_Root_Shell"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.1.4.2.1. Deshabilitando la cuenta shell de root</h5></div></div></div><div class="para">
 					Para prevenir que los usuarios se resgistren directamente como usuarios root, el administrador del sistema puede establecer la consola de la cuenta de root como <code class="command">/sbin/nologin</code> en el archivo <code class="filename">/etc/passwd</code>. Esto previene el acceso a la cuenta root mediante comandos que necesiten una terminal, como por ejemplo el comando <code class="command">su</code> y los comandos <code class="command">ssh</code>.
@@ -926,7 +926,7 @@ sense=deny file=/etc/vsftpd.ftpusers onerr=succeed
 			</div><div class="section" title="2.1.4.3.1. El comando su" id="sect-Security_Guide-Limiting_Root_Access-The_su_Command"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.1.4.3.1. El comando <code class="command">su</code></h5></div></div></div><div class="para">
 					Cuando un usuario ejecuta el comando <code class="command">su</code>, se le solicita la contraseña de root y, luego de la autenticación, le es dado un indicador de consola.
 				</div><div class="para">
-					Una vez que se registra mediante el comando <code class="command">su</code>, el usuario <span class="emphasis"><em>es</em></span> el usuario root y tiene accesos admisnitrativos absolutos en el sistema <sup>[<a id="id1434209" href="#ftn.id1434209" class="footnote">13</a>]</sup>. Además, una vez que el usuario se ha convertido en root, es posible la utilización del comando <code class="command">su</code> para convertirse en cualquier otro usuario en el sistema sin que por eso se le pida ningún tipo de contraseña.
+					Una vez que se registra mediante el comando <code class="command">su</code>, el usuario <span class="emphasis"><em>es</em></span> el usuario root y tiene accesos admisnitrativos absolutos en el sistema <sup>[<a id="id1334246" href="#ftn.id1334246" class="footnote">13</a>]</sup>. Además, una vez que el usuario se ha convertido en root, es posible la utilización del comando <code class="command">su</code> para convertirse en cualquier otro usuario en el sistema sin que por eso se le pida ningún tipo de contraseña.
 				</div><div class="para">
 					Debido a la potencia de este programa, los administradores de una organización podrían desear limitar a quiénes tienen acceso a este comando.
 				</div><div class="para">
@@ -2369,7 +2369,7 @@ Sep  7 14:58:33 localhost xinetd[5283]: EXIT: telnet status=0 pid=5285 duration=
 	</div><div class="para">
 		Kerberos es una forma de eliminar la necesidad de protocolos que permitan métodos inseguros de autenticación, por lo que mejora la seguridad general de la red.
 	</div><div class="section" title="2.6.1. ¿Qué es Kerberos?" id="sect-Security_Guide-Kerberos-What_is_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.1. ¿Qué es Kerberos?</h3></div></div></div><div class="para">
-			Kerberos es un protocolo de autenticación de red creado por el MIT (Massachusetts Institute of Technology), y utiliza una criptografía de llave simétrica <sup>[<a id="id1294424" href="#ftn.id1294424" class="footnote">14</a>]</sup> para autenticar a los usuarios de los servicios de red, lo que en pocas palabras significa que las contraseñas nunca son enviadas a través de la red.
+			Kerberos es un protocolo de autenticación de red creado por el MIT (Massachusetts Institute of Technology), y utiliza una criptografía de llave simétrica <sup>[<a id="id1255417" href="#ftn.id1255417" class="footnote">14</a>]</sup> para autenticar a los usuarios de los servicios de red, lo que en pocas palabras significa que las contraseñas nunca son enviadas a través de la red.
 		</div><div class="para">
 			Consecuentemente, cuando los usuarios se autentican con servicios de red usando Kerberos, los usuarios no autorizados que intenten averiguar las contraseñas monitoreando el tráfico de red son efectivamente bloqueados.
 		</div><div class="section" title="2.6.1.1. Ventajas de Kerberos" id="sect-Security_Guide-What_is_Kerberos-Advantages_of_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.6.1.1. Ventajas de Kerberos</h4></div></div></div><div class="para">
@@ -3957,13 +3957,13 @@ include "/etc/racoon/<em class="replaceable"><code>X.X.X.X</code></em>.conf"
 						<a href="http://www.netfilter.org/">http://www.netfilter.org/</a> — El hogar del proyecto netfilter/iptables. Contiene información ordenada acerca de <code class="command">iptables</code>, incluyendo un FAQ que describe problemas específicos, y varias guías útiles realizadas por Rusty Russell, el encargado del cortafuegos para IP de Linux. Los diferentes tutoriales del sitio abarcan diferentes temas, como ser por ejemplo, una descripción de los conceptos básicos de trabajo en redes, filtros de paquetes del kernel y configuraciones NAT.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.linuxnewbie.org/nhf/Security/IPtables_Basics.html">http://www.linuxnewbie.org/nhf/Security/IPtables_Basics.html</a> — Una introducción acerca de cómo los paquetes se trasladan dentro del kernel de Linux, más una introducción para saber cómo construir comandos básicos de <code class="command">iptables</code>.
-					</div></li></ul></div></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div class="footnote"><p><sup>[<a id="ftn.id1438905" href="#id1438905" class="para">11</a>] </sup>
+					</div></li></ul></div></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div class="footnote"><p><sup>[<a id="ftn.id1338926" href="#id1338926" class="para">11</a>] </sup>
 					Dado que el BIOS de cada sistema es diferente de acuerdo a su fabricante, algunos podrían no tener soporte para protección mediante contraseña de algún tipo, mientras que otros podrían solo soportar un tipo pero no otro.
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1438685" href="#id1438685" class="para">12</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1338705" href="#id1338705" class="para">12</a>] </sup>
 						GRUB also accepts unencrypted passwords, but it is recommended that an MD5 hash be used for added security.
-					</p></div><div class="footnote"><p><sup>[<a id="ftn.id1434209" href="#id1434209" class="para">13</a>] </sup>
+					</p></div><div class="footnote"><p><sup>[<a id="ftn.id1334246" href="#id1334246" class="para">13</a>] </sup>
 						Estos accesos aún están sujetos a las restricciones impuestas por SELinux, si es que se encuentra activo.
-					</p></div><div class="footnote"><p><sup>[<a id="ftn.id1294424" href="#id1294424" class="para">14</a>] </sup>
+					</p></div><div class="footnote"><p><sup>[<a id="ftn.id1255417" href="#id1255417" class="para">14</a>] </sup>
 				Un sistema donde tanto el cliente como el servidor comparten una clave común que es utilizada para encriptar y desencriptar comunicaciones a través de una red.
 			</p></div></div></div><div xml:lang="es-ES" class="chapter" title="Capítulo 3. Encriptación" id="chap-Security_Guide-Encryption" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 3. Encriptación</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Datos en reposo</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption">3.2. Encriptación completa del disco</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">3.3. Encriptación basada en archivo</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion">3.4. Datos en movimiento</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks">3.5. Redes privadas virtuales (VPNs)</a></span></dt><dt>
 <span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Secure_Shell">3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption">3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. Implementación de LUKS en Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories">3.7.2. Encriptación manual de directorios</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions">3.7.3. Instrucciones paso a paso</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_jus
 t_accomplished">3.7.4. Lo que acaba de realizar</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest">3.7.5. Enlaces de interés</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives">3.8. Archivos Encriptados 7-Zip</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. Instalación de 7-Zip en Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions">3.8.2. Instrucciones paso a paso para su instalación</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions">3.8.3. Instrucciones paso a paso para su utilización</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of
 _note">3.8.4. Elementos para prestar atención</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG">3.9. Utilizando GNU Privacy Guard (GnuPG)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Crear claves GPG en GNOME</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1">3.9.2. Crear claves GPG en KDE</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE">3.9.3. Crear una clave GPG mediante la línea de comandos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption">3.9.4. Acerca del encriptado de la clave pública</a></span></dt></dl></dd></dl></div><div class="para">
 		Existen dos clases principales de datos que deben ser protegidos: datos en reposo y datos en movimiento. Estas clases de datos son protegidas en forma similar utilizando tecnología similar, pero la forma en que se implementa esta protección puede ser completamente diferente en un caso y en otro. Por sí solo, ningún modo de protección puede prevenir nuestro sistema de todos los posibles métodos en que puede llegar a ser dañado, ya que la misma información puede estar en descanso y en movimiento en diferentes lugares y al mismo tiempo.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html b/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html
index 6989b60..5eabdb7 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Redes privadas virtuales (VPNs)" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /></head><body class="toc_embeded "><div id="toc
 div" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)" id="Security_Guide-Encryption-Data_in_Motion-Secure_Shell"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3
 .6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Redes privadas virtuales (VPNs)" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /></head><body class="toc_embeded "><div id=
 "tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)" id="Security_Guide-Encryption-Data_in_Motion-Secure_Shell"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="titl
 e">3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</h2></div></div></div><div class="para">
 			Shell seguro (SSH) es un protocolo de red muy poderoso que se utiliza para comunicarse con otros sistemas operativos a través de un canal seguro. Las transmisiones realizadas con SSH están encriptadas y protegidas de cualquier tipo de intercepción. Pueden utilizarse también registros de tipo criptográfico para proveer un mejor método de autenticación además del tradicional nombre de usuario y contraseña.
 		</div><div class="para">
 			SSH es muy fácil de activar. Simplemente iniciando el servicio SSH, el sistema comenzará a aceptar conexiones y les permitirá acceder al sistema sólo a aquellas que, durante el proceso de conexión, indiquen correctamente tanto un nombre de usuario como una contraseña. El TCP estándar para las conexiones SSH es 22, sin embargo esto puede cambiarse modificando el archivo de configuración <span class="emphasis"><em>/etc/ssh/sshd_config</em></span>, y reiniciando el servicio. Este archivo también contiene otras opciones de configuración para SSH.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html b/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html
index bc4b39e..3f4998e 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.5. Redes privadas virtuales (VPNs)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Datos en movimiento" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../..
 /../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.5. Redes privadas virtuales (VPNs)" id="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.5. Redes privadas virtuales (VPNs)</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.5. Redes privadas virtuales (VPNs)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Datos en movimiento" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src=".
 ./../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.5. Redes privadas virtuales (VPNs)" id="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.5. Redes privadas virtuales (VPNs)</h2></div></div></div><div class="para">
 			Las Redes Virtuales Privadas (VPNs, por las iniciales en inglés de Virtual Private Networks), proveen túneles encriptados entre computadoras o redes de computadoras a lo largo de todos los puertos. Esto significa lógicamente que tanto el cliente como el servidor están conectados a la misma red a través de VPN. Las VPNs son muy comunes, y muy fáciles de configurar y de utilizar.
 		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Anterior</strong>3.4. Datos en movimiento</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Siguiente</strong>3.6. Shell seguro (SSH, por las iniciales en ingl...</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion.html b/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion.html
index 7c15006..fb8d0cc 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.4. Datos en movimiento</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Encriptación basada en archivo" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Redes privadas virtuales (VPNs)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" 
 src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.4. Datos en movimiento" id="Security_Guide-Encryption-Data_in_Motion"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.4. Datos en movimiento</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.4. Datos en movimiento</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Encriptación basada en archivo" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Redes privadas virtuales (VPNs)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="t
 oc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.4. Datos en movimiento" id="Security_Guide-Encryption-Data_in_Motion"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.4. Datos en movimiento</h2></div></div></div><div class="para">
 			Los datos en movimiento son datos que están siendo transmitidos en una red. La mayor amenaza a este tipo de datos son las intercepciones y alteraciones que puedan sufrir. Los datos de su nombre de usuario y contraseña nunca deberían ser transmitidos en una red sin que viajen protegidos, ya que podrían ser interceptados, y de este modo permitir que alguien se haga pasar por usted, o que pueda obtener acceso a información importante. Otro tipo de información privada, como son por ejemplo los datos de una cuenta bancaria, deberían también ser protegidos cada vez que sean transmitidos a través de una red. Si lo que se encripta es la sesión entera de red iniciada, entonces no tiene que preocuparse acerca de posibles ataques a los datos que se transmitan en ella.
 		</div><div class="para">
 			Los datos en movimiento son particularmente vulnerables a los atacantes, ya que ellos no necesitan estar cerca de la computadora en donde estos datos son almacenados: simplemente necesitan estar en algún punto del camino que esos datos están recorriendo. Los túneles de encriptado pueden proteger los datos a lo largo del camino de las comunicaciones.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html b/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html
index 7a410ff..b61497c 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.3. Encriptación basada en archivo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Encriptación completa del disco" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Datos en movimiento" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc
 .html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.3. Encriptación basada en archivo" id="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.3. Encriptación basada en archivo</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.3. Encriptación basada en archivo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Encriptación completa del disco" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Datos en movimiento" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../..
 /toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.3. Encriptación basada en archivo" id="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.3. Encriptación basada en archivo</h2></div></div></div><div class="pa
 ra">
 			GnuPG (GPG) es una versión de código abierto de PGP, que le permite firmar y/o encriptar un archivo o mensaje de correo electrónico. Esto es útil para mantener la integridad del mensaje o del archivo, y también protege la confidencialidad de la información contenida. En el caso del correo electrónico, GPG brinda una protección doble. No solo puede proveer protección para los datos en reposo, sino también para los datos en movimiento, luego que el mensaje ha sido enviado a través de la red.
 		</div><div class="para">
 			El encriptado de archivos está orientado para proteger un archivo luego que éste haya abandonado su computadora, como cuando, por ejemplo, envía un CD a través del correo postal. Algunas herramientas para encriptar archivos pueden dejar rastros de aquellos archivos que encriptan, rastros que podrían ser recuperados en algunas circunstancias por atacantes que tengan acceso físico a su equipo. Para proteger de este tipo de ataques a los contenidos de los archivos, utilice la herramienta de encriptado de archivos combinada con alguna otra, como ser por ejemplo, el encriptado total del disco.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/We_Need_Feedback.html b/public_html/es-ES/Fedora/11/html/Security_Guide/We_Need_Feedback.html
index 07dcaaa..be71607 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/We_Need_Feedback.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/We_Need_Feedback.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2. ¡Necesitamos sus comentarios!</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="pref-Security_Guide-Preface.html" title="Prefacio" /><link rel="prev" href="pref-Security_Guide-Preface.html" title="Prefacio" /><link rel="next" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe><
 /div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="pref-Security_Guide-Preface.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Security_Overview.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2. ¡Necesitamos sus comentarios!" id="We_Need_Feedback" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2. ¡Necesitamos sus comentarios!</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2. ¡Necesitamos sus comentarios!</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="pref-Security_Guide-Preface.html" title="Prefacio" /><link rel="prev" href="pref-Security_Guide-Preface.html" title="Prefacio" /><link rel="next" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</ifra
 me></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="pref-Security_Guide-Preface.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Security_Overview.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2. ¡Necesitamos sus comentarios!" id="We_Need_Feedback" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2. ¡Necesitamos sus comentarios!</h2></div></div></div><div class="para">
 		Más información acerca del proyecto Guía de Seguridad de Linux puede encontrarse en <a href="https://fedorahosted.org/securityguide">https://fedorahosted.org/securityguide</a>
 	</div><div class="para">
 		Para entregar una retroalimentación de la Guía de Seguridad, por favor envíe un error a <a href="https://bugzilla.redhat.com/enter_bug.cgi?component=security-guide&amp;product=Fedora%20Documentation">https://bugzilla.redhat.com/enter_bug.cgi?component=security-guide&amp;product=Fedora%20Documentation</a>. Por favor seleccione el componente adecuado en el menú desplegable, que debería ser el nombre de la página.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Encryption.html b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Encryption.html
index df36ce2..a54e41d 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Encryption.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 3. Encriptación</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.7.2. Sitios web útiles sobre IPTables" /><link rel="next" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Encriptación completa del disco" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.ht
 ml">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 3. Encriptación" id="chap-Security_Guide-Encryption" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 3. Encriptación</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Se
 curity_Guide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Datos en reposo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html">3.2. Encriptación completa del disco</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html">3.3. Encriptación basada en archivo</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">3.4. Datos en movimiento</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html">3.5. Redes privadas virtuales (VPNs)</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">3
 .7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. Implementación de LUKS en Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html">3.7.2. Encriptación manual de directorios</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html">3.7.3. Instrucciones paso a paso</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html">3.7.4. Lo que acaba de realizar</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html">3.7.5. Enlaces de interés</a><
 /span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html">3.8. Archivos Encriptados 7-Zip</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. Instalación de 7-Zip en Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html">3.8.2. Instrucciones paso a paso para su instalación</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html">3.8.3. Instrucciones paso a paso para su utilización</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html">3.8.4. Elementos para prestar atención</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Se
 curity_Guide-Encryption-Using_GPG.html">3.9. Utilizando GNU Privacy Guard (GnuPG)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Crear claves GPG en GNOME</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html">3.9.2. Crear claves GPG en KDE</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html">3.9.3. Crear una clave GPG mediante la línea de comandos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html">3.9.4. Acerca del encriptado de la clave pública</a></span></dt></dl></dd></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 3. Encriptación</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="index.html" title="Guía de Seguridad" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.7.2. Sitios web útiles sobre IPTables" /><link rel="next" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Encriptación completa del disco" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../.
 ./toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 3. Encriptación" id="chap-Security_Guide-Encryption" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 3. Encriptación</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href=
 "chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Datos en reposo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html">3.2. Encriptación completa del disco</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html">3.3. Encriptación basada en archivo</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">3.4. Datos en movimiento</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html">3.5. Redes privadas virtuales (VPNs)</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption
 .html">3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. Implementación de LUKS en Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html">3.7.2. Encriptación manual de directorios</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html">3.7.3. Instrucciones paso a paso</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html">3.7.4. Lo que acaba de realizar</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html">3.7.5. Enlaces de inter
 és</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html">3.8. Archivos Encriptados 7-Zip</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. Instalación de 7-Zip en Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html">3.8.2. Instrucciones paso a paso para su instalación</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html">3.8.3. Instrucciones paso a paso para su utilización</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html">3.8.4. Elementos para prestar atención</a></span></dt></dl></dd><dt><span class="section"><a href=
 "sect-Security_Guide-Encryption-Using_GPG.html">3.9. Utilizando GNU Privacy Guard (GnuPG)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Crear claves GPG en GNOME</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html">3.9.2. Crear claves GPG en KDE</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html">3.9.3. Crear una clave GPG mediante la línea de comandos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html">3.9.4. Acerca del encriptado de la clave pública</a></span></dt></dl></dd></dl></div><div class="para">
 		Existen dos clases principales de datos que deben ser protegidos: datos en reposo y datos en movimiento. Estas clases de datos son protegidas en forma similar utilizando tecnología similar, pero la forma en que se implementa esta protección puede ser completamente diferente en un caso y en otro. Por sí solo, ningún modo de protección puede prevenir nuestro sistema de todos los posibles métodos en que puede llegar a ser dañado, ya que la misma información puede estar en descanso y en movimiento en diferentes lugares y al mismo tiempo.
 	</div><div class="section" title="3.1. Datos en reposo" id="sect-Security_Guide-Encryption-Data_at_Rest"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.1. Datos en reposo</h2></div></div></div><div class="para">
 			Data at rest is data that is stored on a hard drive, tape, CD, DVD, disk, or other media. This information's biggest threat comes from being physically stolen. Laptops in airports, CDs going through the mail, and backup tapes that get left in the wrong places are all examples of events where data can be compromised through theft. If the data was encrypted on the media then you wouldn't have to worry as much about the data being compromised.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html
index 989257b..61f15fc 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 4. Principios Generales sobre la Seguridad de la Información</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Acerca del encriptado de la clave pública" /><link rel="next" href="chap-Security_Guide-Secure_Installation.html" title="Capítulo 5. Instalación segura" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../..
 /../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Secure_Installation.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 4. Principios Generales sobre la Seguridad de la Información" id="chap-Security_Guide-General_Principles_of_Information_Security" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 4. Principios Generales sobre la Seguridad de 
 la Información</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Consejos, Guías y Herramientas</a></span></dt></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 4. Principios Generales sobre la Seguridad de la Información</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="index.html" title="Guía de Seguridad" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Acerca del encriptado de la clave pública" /><link rel="next" href="chap-Security_Guide-Secure_Installation.html" title="Capítulo 5. Instalación segura" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" sr
 c="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Secure_Installation.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 4. Principios Generales sobre la Seguridad de la Información" id="chap-Security_Guide-General_Principles_of_Information_Security" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 4. Principios Generales sobre la Segur
 idad de la Información</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Consejos, Guías y Herramientas</a></span></dt></dl></div><div class="para">
 		Los siguientes principios generales ofrecen una visión panorámica de algunas buenas actitudes para adoptar relacionadas con la seguridad:
 	</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 				encriptar todos los datos transmitidos por la red para ayudar a prevenir ataques de tipo hombre-en-el-medio, o escuchas. Es importante encriptar de la información de autenticación, como ser contraseñas.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-References.html b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-References.html
index a2e4374..215facf 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-References.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-References.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 7. Referencias</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Instale paquetes identificados desde repositorios conocidos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="titl
 e"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Anterior</strong></a></li><li class="next"></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 7. Referencias" id="chap-Security_Guide-References" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 7. Referencias</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 7. Referencias</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="index.html" title="Guía de Seguridad" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Instale paquetes identificados desde repositorios conocidos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p 
 id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Anterior</strong></a></li><li class="next"></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 7. Referencias" id="chap-Security_Guide-References" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 7. Referencias</h2></div></div></div><div class="para">
 		Las siguientes referencias tienen como objetivo orientar la búsqueda de información adicional relacionada con SELinux y Fedora pero están más allá del alcance de esta guía. Tenga en cuenta que debido al veloz desarrollo de SELinux, algunos de estos materiales podrían utilizarse sólo en versiones específicas de Fedora.
 	</div><div class="variablelist" title="Libros" id="vari-Security_Guide-References-Books"><h6>Libros</h6><dl><dt><span class="term">SELinux en Ejemplos</span></dt><dd><div class="para">
 					Mayer, MacMillan y Caplan
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Secure_Installation.html b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Secure_Installation.html
index 5e4df52..f1cac06 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Secure_Installation.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Secure_Installation.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 5. Instalación segura</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Capítulo 4. Principios Generales sobre la Seguridad de la Información" /><link rel="next" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. Utilice encriptado de particiones mediante LUKS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="t
 ocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 5. Instalación segura" id="chap-Security_Guide-Secure_Installation" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 5. Instalación segura</h2></div></div></div><div
  class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Particiones del disco</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">5.2. Utilice encriptado de particiones mediante LUKS</a></span></dt></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 5. Instalación segura</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="index.html" title="Guía de Seguridad" /><link rel="prev" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Capítulo 4. Principios Generales sobre la Seguridad de la Información" /><link rel="next" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. Utilice encriptado de particiones mediante LUKS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifra
 me id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 5. Instalación segura" id="chap-Security_Guide-Secure_Installation" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 5. Instalación segura</h2></div></div></
 div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Particiones del disco</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">5.2. Utilice encriptado de particiones mediante LUKS</a></span></dt></dl></div><div class="para">
 		La seguridad comienza con la primera vez que introduce un CD o DVD para instalar Fedora. Configurar su sistema en forma segura desde un principio, hace que sea más fácil implementar configuraciones de seguridad adicional más adelante.
 	</div><div class="section" title="5.1. Particiones del disco" id="sect-Security_Guide-Secure_Installation-Disk_Partitions"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">5.1. Particiones del disco</h2></div></div></div><div class="para">
 			La NSA recomienda crear particiones separadas para /boot, /, /home, /tmp y /var/tmp. Las razones son diferentes y se tratará por separado para cada partición.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html
index 06016fb..054a819 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 2. Asegurando su Red</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. Aplicación de los cambios" /><link rel="next" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enabl
 e iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 2. Asegurando su Red" id="chap-Security_Guide-Securing_Your_Network" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 2. Asegurando su Red</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">2.1. Segur
 idad de la estación de trabajo</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Evaluación de la seguridad de la estación de trabajo</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. Seguridad en el BIOS y en el gestor de arranque</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Seguridad de contraseñas</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Controles administrativos</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Secu
 rity_Guide-Workstation_Security-Available_Network_Services">2.1.5. Servicios de red disponibles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Cortafuegos personales</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Herramientas de comunicación de seguridad mejorada</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">2.2. Seguridad del servidor</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Asegurando los servicios con encapsuladores TCP y xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securi
 ng_Portmap.html">2.2.2. Asegurando Portmap</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">2.2.3. Asegurando NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">2.2.4. Asegurando NFS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">2.2.5. Asegurando el servidor HTTP Apache</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">2.2.6. Asegurando FTP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">2.2.7. Asegurando Sendmail</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">2.2.8. Verificar qué puertos están abiertos</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_S
 ign_on_SSO.html">2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Introducción</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">2.3.2. Empezar a utilizar su nueva tarjeta inteligente</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">2.3.4. Cómo funciona el ingreso con tarjeta inteligente</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">2.3.5. Conf
 igurar Firefox para la utilización de Kerberos como SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Ventajas de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">2.4.2. Archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">2.4.3. Formato del archivo de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Module
 s_PAM-Sample_PAM_Configuration_Files.html">2.4.4. Ejemplos de archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">2.4.5. Creación de los módulos PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">2.4.6. PAM y el cacheo de la credencial administrativa</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html">2.4.7. PAM y la propiedad de los dispositivos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">2.4.8. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">2.5. Encapsuladores TCP y xinetd</a></span></dt><dd><dl>
 <dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. Encapsuladores TCP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">2.5.2. Archivos de configuración de los encapsuladores TCP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">2.5.4. Archivos de configuración de xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">2.5.5. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-
 Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. ¿Qué es Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">2.6.2. Terminología de Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">2.6.3. Como Funciona Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">2.6.4. Kerberos y PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">2.6.5. Configurando un servidor Kerberos 5</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">2.6.6. Configuración de un Cliente Kerberos 5</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">2.6.7. Mapeo dominio-a-reinado</a></span></dt><dt><span class="section"
 ><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">2.6.8. Configurando KDCs secundarios</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">2.6.9. Configurando la autenticación cruzada de reinados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">2.6.10. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html">2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. ¿Cómo funciona una VPN?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html">2.7.2. VPNs y Fed
 ora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html">2.7.4. Creando una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html">2.7.5. Instalación de IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html">2.7.6. Configuración de IPsec equipo-a-equipo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html">2.7.7. Configuración IPsec red-a-red</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connecti
 on.html">2.7.8. Iniciar y detener una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html">2.8. Cortafuegos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter e IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html">2.8.2. Configuración básica de un cortafuego</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Using_IPTables.html">2.8.3. Uso de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html">2.8.4. Filtrado común de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html">2.8.5. Reglas <code class="computeroutput">FORWARD</code> y <acronym class="ac
 ronym">NAT</acronym></a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html">2.8.6. Software malicioso y suplantación de direcciones IP </a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html">2.8.7. IPTables y el seguimiento de la conexión</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPv6.html">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Additional_Resources.html">2.8.9. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-IPTables.html">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-IPTables.html#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Filtrado de Paquete</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Differences_Betwe
 en_IPTables_and_IPChains.html">2.9.2. Diferencias entre IPTables e IPChains</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html">2.9.3. Opciones de la línea de comandos de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html">2.9.4. Guardando las reglas de IPTalbes</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html">2.9.5. Programas de control de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html">2.9.6. IPTables e IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Additional_Resources.html">2.9.7. Recursos adicionales</a></span></dt></dl></dd></dl></div><div xml:lang="es-ES" class="section" title="2.1. Seguridad de la estación de trabajo" id="sect-Security_Guide-Workstation_Security" lang="es-ES"><div c
 lass="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.1. Seguridad de la estación de trabajo</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 2. Asegurando su Red</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="index.html" title="Guía de Seguridad" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. Aplicación de los cambios" /><link rel="next" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser 
 or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 2. Asegurando su Red" id="chap-Security_Guide-Securing_Your_Network" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 2. Asegurando su Red</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">2.
 1. Seguridad de la estación de trabajo</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Evaluación de la seguridad de la estación de trabajo</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. Seguridad en el BIOS y en el gestor de arranque</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Seguridad de contraseñas</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Controles administrativos</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#s
 ect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Servicios de red disponibles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Cortafuegos personales</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Herramientas de comunicación de seguridad mejorada</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">2.2. Seguridad del servidor</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Asegurando los servicios con encapsuladores TCP y xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Securit
 y-Securing_Portmap.html">2.2.2. Asegurando Portmap</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">2.2.3. Asegurando NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">2.2.4. Asegurando NFS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">2.2.5. Asegurando el servidor HTTP Apache</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">2.2.6. Asegurando FTP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">2.2.7. Asegurando Sendmail</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">2.2.8. Verificar qué puertos están abiertos</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-
 Single_Sign_on_SSO.html">2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Introducción</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">2.3.2. Empezar a utilizar su nueva tarjeta inteligente</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">2.3.4. Cómo funciona el ingreso con tarjeta inteligente</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">2.3
 .5. Configurar Firefox para la utilización de Kerberos como SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Ventajas de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">2.4.2. Archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">2.4.3. Formato del archivo de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authenticatio
 n_Modules_PAM-Sample_PAM_Configuration_Files.html">2.4.4. Ejemplos de archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">2.4.5. Creación de los módulos PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">2.4.6. PAM y el cacheo de la credencial administrativa</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html">2.4.7. PAM y la propiedad de los dispositivos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">2.4.8. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">2.5. Encapsuladores TCP y xinetd</a></span></dt>
 <dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. Encapsuladores TCP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">2.5.2. Archivos de configuración de los encapsuladores TCP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">2.5.4. Archivos de configuración de xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">2.5.5. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Securit
 y_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. ¿Qué es Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">2.6.2. Terminología de Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">2.6.3. Como Funciona Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">2.6.4. Kerberos y PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">2.6.5. Configurando un servidor Kerberos 5</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">2.6.6. Configuración de un Cliente Kerberos 5</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">2.6.7. Mapeo dominio-a-reinado</a></span></dt><dt><span class="
 section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">2.6.8. Configurando KDCs secundarios</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">2.6.9. Configurando la autenticación cruzada de reinados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">2.6.10. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html">2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. ¿Cómo funciona una VPN?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html">2.7.2. VP
 Ns y Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html">2.7.4. Creando una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html">2.7.5. Instalación de IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html">2.7.6. Configuración de IPsec equipo-a-equipo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html">2.7.7. Configuración IPsec red-a-red</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_
 Connection.html">2.7.8. Iniciar y detener una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html">2.8. Cortafuegos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter e IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html">2.8.2. Configuración básica de un cortafuego</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Using_IPTables.html">2.8.3. Uso de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html">2.8.4. Filtrado común de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html">2.8.5. Reglas <code class="computeroutput">FORWARD</code> y <acronym c
 lass="acronym">NAT</acronym></a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html">2.8.6. Software malicioso y suplantación de direcciones IP </a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html">2.8.7. IPTables y el seguimiento de la conexión</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPv6.html">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Additional_Resources.html">2.8.9. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-IPTables.html">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-IPTables.html#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Filtrado de Paquete</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Differenc
 es_Between_IPTables_and_IPChains.html">2.9.2. Diferencias entre IPTables e IPChains</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html">2.9.3. Opciones de la línea de comandos de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html">2.9.4. Guardando las reglas de IPTalbes</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html">2.9.5. Programas de control de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html">2.9.6. IPTables e IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Additional_Resources.html">2.9.7. Recursos adicionales</a></span></dt></dl></dd></dl></div><div xml:lang="es-ES" class="section" title="2.1. Seguridad de la estación de trabajo" id="sect-Security_Guide-Workstation_Security" lang="es-ES
 "><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.1. Seguridad de la estación de trabajo</h2></div></div></div><div class="para">
 		Asegurar un entorno Linux comienza con la estación de trabajo. Ya sea bloqueando una máquina personal, o asegurando un sistema corporativo, cualquier política de seguridad empieza con la computadora individual. La seguridad de una red de computadoras es la misma que la de su nodo más débil.
 	</div><div class="section" title="2.1.1. Evaluación de la seguridad de la estación de trabajo" id="sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.1.1. Evaluación de la seguridad de la estación de trabajo</h3></div></div></div><div class="para">
 			Cuando se evalúa la seguridad de una estación de trabajo Fedora, considere los siguientes aspectos:
@@ -23,7 +23,7 @@
 		</div><div class="para">
 			Por otro lado, si la estación de trabajo se encuentra ubicada en un lugar al cuál tienen acceso solo personas autorizadas o de confianza, en ese caso asegurar el BIOS o el gestor de arranque podría no ser necesario.
 		</div><div class="section" title="2.1.2.1. Contraseña BIOS" id="sect-Security_Guide-BIOS_and_Boot_Loader_Security-BIOS_Passwords"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.1.2.1. Contraseña BIOS</h4></div></div></div><div class="para">
-				Las dos razones fundamentales para proteger con una contraseña el BIOS de una computadora son <sup>[<a id="id1564732" href="#ftn.id1564732" class="footnote">11</a>]</sup>:
+				Las dos razones fundamentales para proteger con una contraseña el BIOS de una computadora son <sup>[<a id="id2609759" href="#ftn.id2609759" class="footnote">11</a>]</sup>:
 			</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Evitar modificaciones a la configuración del BIOS</em></span> — Si un intruso tiene acceso al BIOS, puede configurarlo para iniciarse desde un diskette o CD-ROM. Esto hace que sea posible para él ingresar en modo rescate o en modo de único usuario, lo que a su vez permite que inicie procesos a elección en el sistema, o que pueda copiar información importante.
 					</div></li><li class="listitem"><div class="para">
@@ -55,7 +55,7 @@
 					A continuación, edite el archivo de configuración del GRUB <code class="filename">/boot/grub/grub.conf</code>. Abra el archivo y debajo de la línea <code class="command">timeout</code> en la sección principal del documento, añada la siguiente:
 				</div><pre class="screen"><code class="command">password --md5 <em class="replaceable"><code>&lt;password-hash&gt;</code></em></code>
 </pre><div class="para">
-					Replace <em class="replaceable"><code>&lt;password-hash&gt;</code></em> with the value returned by <code class="command">/sbin/grub-md5-crypt</code><sup>[<a id="id1338150" href="#ftn.id1338150" class="footnote">12</a>]</sup>.
+					Replace <em class="replaceable"><code>&lt;password-hash&gt;</code></em> with the value returned by <code class="command">/sbin/grub-md5-crypt</code><sup>[<a id="id2600733" href="#ftn.id2600733" class="footnote">12</a>]</sup>.
 				</div><div class="para">
 					La próxima vez que el sistema sea iniciado, el menú del GRUB evitará que se ingrese al editor, o a la interfaz de comandos, sin haber presionado primero la tecla <span class="keycap"><strong>p</strong></span>, seguida de la contraseña del GRUB
 				</div><div class="para">
@@ -314,14 +314,14 @@ Account Expiration Date (YYYY-MM-DD) [1969-12-31]:
 							</td></tr><tr><td>
 								Utilice PAM para limitar el acceso root a los servicios.
 							</td><td>
-								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<sup>[<a id="id1418038" href="#ftn.id1418038" class="footnote">a</a>]</sup>
+								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<sup>[<a id="id1311099" href="#ftn.id1311099" class="footnote">a</a>]</sup>
 							</td><td>
 								<table border="0" summary="Simple list" class="simplelist"><tr><td>Previene el acceso root a los servicios de red que son compatibles com PAM.</td></tr><tr><td>Los siguientes servcicios son prevenidos al intentar acceder a la cuenta de root:</td></tr><tr><td>· Clientes de FTP</td></tr><tr><td>· Clientes de correo</td></tr><tr><td>· <code class="command">login</code></td></tr><tr><td>· <code class="command">gdm</code></td></tr><tr><td>· <code class="command">kdm</code></td></tr><tr><td>· <code class="command">xdm</code></td></tr><tr><td>· <code class="command">ssh</code></td></tr><tr><td>· <code class="command">scp</code></td></tr><tr><td>· <code class="command">sftp</code></td></tr><tr><td>· Cualquier servicio PAM</td></tr></table>
 
 							</td><td>
 								<table border="0" summary="Simple list" class="simplelist"><tr><td>Programas y servicios que no son compatibles con PAM.</td></tr></table>
 
-							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div class="footnote"><p><sup>[<a id="ftn.id1418038" href="#id1418038" class="para">a</a>] </sup>
+							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div class="footnote"><p><sup>[<a id="ftn.id1311099" href="#id1311099" class="para">a</a>] </sup>
 									Refer to <a class="xref" href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Disallowing_Root_Access-Disabling_Root_Using_PAM" title="2.1.4.2.4. Deshabilitando root usando PAM">Sección 2.1.4.2.4, “Deshabilitando root usando PAM”</a> for details.
 								</p></div></td></tr></tbody></table></div><h6>Tabla 2.1. Métodos para deshabilitar la cuenta root</h6></div><br class="table-break" /><div class="section" title="2.1.4.2.1. Deshabilitando la cuenta shell de root" id="sect-Security_Guide-Disallowing_Root_Access-Disabling_the_Root_Shell"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.1.4.2.1. Deshabilitando la cuenta shell de root</h5></div></div></div><div class="para">
 					Para prevenir que los usuarios se resgistren directamente como usuarios root, el administrador del sistema puede establecer la consola de la cuenta de root como <code class="command">/sbin/nologin</code> en el archivo <code class="filename">/etc/passwd</code>. Esto previene el acceso a la cuenta root mediante comandos que necesiten una terminal, como por ejemplo el comando <code class="command">su</code> y los comandos <code class="command">ssh</code>.
@@ -356,7 +356,7 @@ sense=deny file=/etc/vsftpd.ftpusers onerr=succeed
 			</div><div class="section" title="2.1.4.3.1. El comando su" id="sect-Security_Guide-Limiting_Root_Access-The_su_Command"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.1.4.3.1. El comando <code class="command">su</code></h5></div></div></div><div class="para">
 					Cuando un usuario ejecuta el comando <code class="command">su</code>, se le solicita la contraseña de root y, luego de la autenticación, le es dado un indicador de consola.
 				</div><div class="para">
-					Una vez que se registra mediante el comando <code class="command">su</code>, el usuario <span class="emphasis"><em>es</em></span> el usuario root y tiene accesos admisnitrativos absolutos en el sistema <sup>[<a id="id1790827" href="#ftn.id1790827" class="footnote">13</a>]</sup>. Además, una vez que el usuario se ha convertido en root, es posible la utilización del comando <code class="command">su</code> para convertirse en cualquier otro usuario en el sistema sin que por eso se le pida ningún tipo de contraseña.
+					Una vez que se registra mediante el comando <code class="command">su</code>, el usuario <span class="emphasis"><em>es</em></span> el usuario root y tiene accesos admisnitrativos absolutos en el sistema <sup>[<a id="id1342606" href="#ftn.id1342606" class="footnote">13</a>]</sup>. Además, una vez que el usuario se ha convertido en root, es posible la utilización del comando <code class="command">su</code> para convertirse en cualquier otro usuario en el sistema sin que por eso se le pida ningún tipo de contraseña.
 				</div><div class="para">
 					Debido a la potencia de este programa, los administradores de una organización podrían desear limitar a quiénes tienen acceso a este comando.
 				</div><div class="para">
@@ -530,10 +530,10 @@ sense=deny file=/etc/vsftpd.ftpusers onerr=succeed
 				Although the <code class="command">sshd</code> service is inherently secure, the service <span class="emphasis"><em>must</em></span> be kept up-to-date to prevent security threats. Refer to <a class="xref" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad">Sección 1.5, “Actualizaciones de seguridad”</a> for more information.
 			</div></div><div class="para">
 			GPG es una manera de asegurar la privacidad en la comunicación de correo. Puede ser utilizado tanto para enviar datos sensibles sobre las redes públicas como para proteger datos sensibles en discos duros.
-		</div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id1564732" href="#id1564732" class="para">11</a>] </sup>
+		</div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id2609759" href="#id2609759" class="para">11</a>] </sup>
 					Dado que el BIOS de cada sistema es diferente de acuerdo a su fabricante, algunos podrían no tener soporte para protección mediante contraseña de algún tipo, mientras que otros podrían solo soportar un tipo pero no otro.
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1338150" href="#id1338150" class="para">12</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2600733" href="#id2600733" class="para">12</a>] </sup>
 						GRUB also accepts unencrypted passwords, but it is recommended that an MD5 hash be used for added security.
-					</p></div><div class="footnote"><p><sup>[<a id="ftn.id1790827" href="#id1790827" class="para">13</a>] </sup>
+					</p></div><div class="footnote"><p><sup>[<a id="ftn.id1342606" href="#id1342606" class="para">13</a>] </sup>
 						Estos accesos aún están sujetos a las restricciones impuestas por SELinux, si es que se encuentra activo.
 					</p></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Anterior</strong>1.5.4. Aplicación de los cambios</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security.html"><strong>Siguiente</strong>2.2. Seguridad del servidor</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Security_Overview.html b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Security_Overview.html
index 90089ab..76e573a 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Security_Overview.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Security_Overview.html
@@ -1,13 +1,13 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 1. Repaso sobre seguridad</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="We_Need_Feedback.html" title="2. ¡Necesitamos sus comentarios!" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Evaluación de debilidades" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</ifram
 e></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="We_Need_Feedback.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 1. Repaso sobre seguridad" id="chap-Security_Guide-Security_Overview" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 1. Repaso sobre seguridad</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security">1.1. Introducción a la Seguridad</a></span></dt><dd><dl><dt>
 <span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. ¿Qué es la seguridad en computación?</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Controles de seguridad</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusión</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.2. Evaluación de debilidades</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-Vulnera
 bility_Assessment-Thinking_Like_the_Enemy">1.2.1. Pensando como el enemigo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.2.2. Definiendo evaluación y pruebas</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.2.3. Herramientas de evaluación</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.3. Atacantes y vulnerabilidades</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Una breve reseña acerca de los hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html">1.3.2. Amenazas a la seguridad de la red</a></span></dt><dt><s
 pan class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.3.3. Amenazas a la seguridad del servidor</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Ataques y debilidades comunes</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Actualizaciones de seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Actualización de paquetes</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Verificació
 n de paquetes firmados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Instalación de paquetes firmados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. Aplicación de los cambios</a></span></dt></dl></dd></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 1. Repaso sobre seguridad</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="index.html" title="Guía de Seguridad" /><link rel="prev" href="We_Need_Feedback.html" title="2. ¡Necesitamos sus comentarios!" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Evaluación de debilidades" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display
 .</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="We_Need_Feedback.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 1. Repaso sobre seguridad" id="chap-Security_Guide-Security_Overview" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 1. Repaso sobre seguridad</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security">1.1. Introducción a la Seguridad</a></span></dt><dd>
 <dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. ¿Qué es la seguridad en computación?</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Controles de seguridad</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusión</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.2. Evaluación de debilidades</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide
 -Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Pensando como el enemigo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.2.2. Definiendo evaluación y pruebas</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.2.3. Herramientas de evaluación</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.3. Atacantes y vulnerabilidades</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Una breve reseña acerca de los hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html">1.3.2. Amenazas a la seguridad de la red</a></span></d
 t><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.3.3. Amenazas a la seguridad del servidor</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Ataques y debilidades comunes</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Actualizaciones de seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Actualización de paquetes</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Veri
 ficación de paquetes firmados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Instalación de paquetes firmados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. Aplicación de los cambios</a></span></dt></dl></dd></dl></div><div class="para">
 		Debido a la creciente necesidad de utilización de poderosas computadoras conectadas en red para poder mantener una empresa en funcionamiento, y para poder realizar seguimientos de nuestra información personal, se han desarrollado industrias enteras dedicadas a la práctica de la seguridad de redes y computadoras. Numerosas empresas han solicitado la pericia y el conocimiento de expertos en seguridad para poder controlar correctamente sus sistemas, y para que diseñen soluciones adecuadas a los requerimientos operativos de la organización. Debido a la naturaleza dinámica de muchas de estas organizaciones, donde los trabajadores deben tener acceso a los recursos informáticos, ya sea en forma local o remota, la necesidad de entornos de computación seguros se ha hecho más pronunciada.
 	</div><div class="para">
 		Desafortunadamente, muchas de las organizaciones (y muchos usuarios individuales), luego de pensarlo dos veces, deciden relegar el aspecto de la seguridad a un plano inferior, dándole prioridad a otras áreas de sus emprendimientos, como ser producción, presupuesto, o infraestructura. Y frecuentemente, una implementación adecuada de la seguridad es adoptada <em class="firstterm">postmortem</em> — luego que un acceso no autorizado haya ocurrido. Los expertos en seguridad concuerdan en que adoptar las medidas correctas antes de conectar un sitio a una red insegura, como lo es Internet, es una manera efectivo de prevenir la mayoría de los intentos de intrusión.
 	</div><div xml:lang="es-ES" class="section" title="1.1. Introducción a la Seguridad" id="sect-Security_Guide-Introduction_to_Security" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.1. Introducción a la Seguridad</h2></div></div></div><div class="section" title="1.1.1. ¿Qué es la seguridad en computación?" id="sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.1.1. ¿Qué es la seguridad en computación?</h3></div></div></div><div class="para">
 			La noción de seguridad en computación es un concepto general que cubre un área muy extensa dentro del ámbito de la computación y del procesamiento de la información. Las industrias que dependen tanto de redes como de sistemas de computación para poder realizar cotidianamente operaciones comerciales, o para acceder a diverso tipo de información vital, entienden que sus datos son una parte importante de sus activos. Han ingresado a nuestro vocabulario cotidiano diversos términos y unidades de medición pertenecientes al ámbito comercial, como ser por ejemplo, el coste total de propiedad (TCO, por las iniciales en inglés de Total Cost of Ownership), o servicio de calidad (QoS, por las iniciales en inglés de Quality of Service). Al utilizar estas unidades, las industrias pueden calcular aspectos tales como ser la integridad de los datos, o el tipo de disponibilidad que tienen, y poder considerarlos parte de los costos de planeamiento y administración de procesos.
  En algunas industrias, como la del comercio electrónico por ejemplo, el tipo de disponibilidad y la confiabilidad de los datos puede ser un elemento determinante para el éxito o el fracaso.
 		</div><div class="section" title="1.1.1.1. ¿De dónde viene la idea de seguridad en computación?" id="sect-Security_Guide-What_is_Computer_Security-How_did_Computer_Security_Come_about"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.1. ¿De dónde viene la idea de seguridad en computación?</h4></div></div></div><div class="para">
-				La seguridad en la información ha evolucionado con el correr de los años debido al aumento en la utilización de redes públicas y el consecuente riesgo de exposición que en ellas tienen los datos privados, confidenciales o financieros. Existen numerosos antecedentes, como el caso Mitnick <sup>[<a id="id2711787" href="#ftn.id2711787" class="footnote">1</a>]</sup> o Vladimir Levin <sup>[<a id="id1508637" href="#ftn.id1508637" class="footnote">2</a>]</sup>, que sugieren a todas las organizaciones de cualquier tipo de industria, replantearse la forma en que tienen organizado el manejo de su propia información, o de la manera en que es transmitida y revelada. La popularidad que tiene Internet es uno de los motivos fundamentales gracias al cual se han intensificado los esfuerzos relacionados con la seguridad en los datos.
+				La seguridad en la información ha evolucionado con el correr de los años debido al aumento en la utilización de redes públicas y el consecuente riesgo de exposición que en ellas tienen los datos privados, confidenciales o financieros. Existen numerosos antecedentes, como el caso Mitnick <sup>[<a id="id1457946" href="#ftn.id1457946" class="footnote">1</a>]</sup> o Vladimir Levin <sup>[<a id="id2594483" href="#ftn.id2594483" class="footnote">2</a>]</sup>, que sugieren a todas las organizaciones de cualquier tipo de industria, replantearse la forma en que tienen organizado el manejo de su propia información, o de la manera en que es transmitida y revelada. La popularidad que tiene Internet es uno de los motivos fundamentales gracias al cual se han intensificado los esfuerzos relacionados con la seguridad en los datos.
 			</div><div class="para">
 				Un número creciente de personas está utilizando sus computadoras personales para obtener acceso a los recursos que ofrece Internet. Desde investigación y obtención de información hasta el correo electrónico y transacciones comerciales, Internet es considerada como uno de los desarrollos más importantes del siglo 20.
 			</div><div class="para">
@@ -15,19 +15,19 @@
 			</div></div><div class="section" title="1.1.1.2. La seguridad hoy" id="sect-Security_Guide-What_is_Computer_Security-Security_Today"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.2. La seguridad hoy</h4></div></div></div><div class="para">
 				En febrero del año 2000 un ataque de denegación de servicio distribuido (DDoS, por las iniciales en inglés de Distributed Denial of Service) fue liberado sobre varios de los sitios de Internet que tenían más tráfico. Este ataque afectó a yahoo.com, cnn.com, amazon.com, fbi.gov y algunos otros sitios que son completamente inaccesibles para los usuarios normales, dejando a los enrutadores bloqueados durante varias horas con transferencias de grandes paquetes ICMP, o también denominado un <em class="firstterm">ping de la muerte</em>. El ataque fue llevado a cabo por asaltantes desconocidos utilizando programas especialmente creados (y que están a disposición de cualquiera), que buscan servidores de red vulnerables, instalan en esos servidores aplicaciones de cliente denominadas <em class="firstterm">troyanos</em>, y sincronizando un ataque con cada servidor infectado, inundando los sitios elegidos y dejándolos inutilizables. Muchos adjudican el éxito del ataque 
 a fallas fundamentales en la forma en que están estructurados los enrutadores y los protocolos que utilizan. Estas fallas tienen que ver con la manera en que se aceptan los datos entrantes, sin importar desde dónde provengan, o con qué propósito los paquetes hayan sido enviados.
 			</div><div class="para">
-				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<sup>[<a id="id1391064" href="#ftn.id1391064" class="footnote">3</a>]</sup>
+				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<sup>[<a id="id1399601" href="#ftn.id1399601" class="footnote">3</a>]</sup>
 			</div><div class="para">
-				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<sup>[<a id="id1462191" href="#ftn.id1462191" class="footnote">4</a>]</sup>
+				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<sup>[<a id="id2598493" href="#ftn.id2598493" class="footnote">4</a>]</sup>
 			</div><div class="para">
-				Actualmente, se estima que 1,4 mil millones de personas usan o usaron Internet alrededor del mundo <sup>[<a id="id1483647" href="#ftn.id1483647" class="footnote">5</a>]</sup>. Al mismo tiempo:
+				Actualmente, se estima que 1,4 mil millones de personas usan o usaron Internet alrededor del mundo <sup>[<a id="id1362773" href="#ftn.id1362773" class="footnote">5</a>]</sup>. Al mismo tiempo:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<sup>[<a id="id1385670" href="#ftn.id1385670" class="footnote">6</a>]</sup>
+						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<sup>[<a id="id1241765" href="#ftn.id1241765" class="footnote">6</a>]</sup>
 					</div></li><li class="listitem"><div class="para">
-						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<sup>[<a id="id1355855" href="#ftn.id1355855" class="footnote">7</a>]</sup>
+						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<sup>[<a id="id1417325" href="#ftn.id1417325" class="footnote">7</a>]</sup>
 					</div></li><li class="listitem"><div class="para">
-						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<sup>[<a id="id1349764" href="#ftn.id1349764" class="footnote">8</a>]</sup>
+						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<sup>[<a id="id2603669" href="#ftn.id2603669" class="footnote">8</a>]</sup>
 					</div></li></ul></div><div class="para">
-				From a 2008 global survey of business and technology executives "The Global State of Information Security"<sup>[<a id="id1773692" href="#ftn.id1773692" class="footnote">9</a>]</sup>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
+				From a 2008 global survey of business and technology executives "The Global State of Information Security"<sup>[<a id="id1351585" href="#ftn.id1351585" class="footnote">9</a>]</sup>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Sólo el 43% de los encuestados audita o monitorea el cumplimiento de las políticas de seguridad de sus usuarios
 					</div></li><li class="listitem"><div class="para">
@@ -100,22 +100,22 @@
 						Registración y control del personal
 					</div></li></ul></div></div></div><div class="section" title="1.1.4. Conclusión" id="sect-Security_Guide-Introduction_to_Security-Conclusion"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.1.4. Conclusión</h3></div></div></div><div class="para">
 			Ahora que ya conoce los orígenes, las razones y los aspectos de la seguridad, encontrará más fácil determinar el rumbo apropiado con respecto a Fedora. Es importante conocer qué factores y condiciones hacen a la seguridad para planear e implementar una estrategia apropiada. Con esta información en mente, el proceso se puede formalizar y los caminos a seguir se hacen más claros a medida que profundiza en los detalles del proceso de seguridad.
-		</div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id2711787" href="#id2711787" class="para">1</a>] </sup>
+		</div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id1457946" href="#id1457946" class="para">1</a>] </sup>
 					http://law.jrank.org/pages/3791/Kevin-Mitnick-Case-1999.html
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1508637" href="#id1508637" class="para">2</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2594483" href="#id2594483" class="para">2</a>] </sup>
 					http://www.livinginternet.com/i/ia_hackers_levin.htm
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1391064" href="#id1391064" class="para">3</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1399601" href="#id1399601" class="para">3</a>] </sup>
 					http://www.theregister.co.uk/2007/05/04/txj_nonfeasance/
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1462191" href="#id1462191" class="para">4</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2598493" href="#id2598493" class="para">4</a>] </sup>
 					http://www.healthcareitnews.com/story.cms?id=9408
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1483647" href="#id1483647" class="para">5</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1362773" href="#id1362773" class="para">5</a>] </sup>
 					http://www.internetworldstats.com/stats.htm
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1385670" href="#id1385670" class="para">6</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1241765" href="#id1241765" class="para">6</a>] </sup>
 							http://www.cert.org
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1355855" href="#id1355855" class="para">7</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1417325" href="#id1417325" class="para">7</a>] </sup>
 							http://www.cert.org/stats/fullstats.html
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1349764" href="#id1349764" class="para">8</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id2603669" href="#id2603669" class="para">8</a>] </sup>
 							http://www.newsfactor.com/perl/story/16407.html
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1773692" href="#id1773692" class="para">9</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1351585" href="#id1351585" class="para">9</a>] </sup>
 					http://www.csoonline.com/article/454939/The_Global_State_of_Information_Security_
 				</p></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="We_Need_Feedback.html"><strong>Anterior</strong>2. ¡Necesitamos sus comentarios!</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Siguiente</strong>1.2. Evaluación de debilidades</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Software_Maintenance.html b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Software_Maintenance.html
index 0c73f63..8744de0 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Software_Maintenance.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/chap-Security_Guide-Software_Maintenance.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 6. Mantenimiento de Software</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. Utilice encriptado de particiones mediante LUKS" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Planifique y configure actualizaciones de seguridad" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe 
 id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 6. Mantenimiento de Software" id="chap-Security_Guide-Software_Maintenance" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 6. Mantenimiento de Sof
 tware</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Instale el software mínimo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">6.2. Planifique y configure actualizaciones de seguridad</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">6.3. Ajustando las actualizaciones automáticas</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">6.4. Instale paquetes identificados desde repositorios conocidos</a></span></dt></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Capítulo 6. Mantenimiento de Software</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="index.html" title="Guía de Seguridad" /><link rel="prev" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. Utilice encriptado de particiones mediante LUKS" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Planifique y configure actualizaciones de seguridad" /></head><body class="toc_embeded "><div id="tocdiv" class="toc">
 <iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="chapter" title="Capítulo 6. Mantenimiento de Software" id="chap-Security_Guide-Software_Maintenance" lang="es-ES"><div class="titlepage"><div><div><h2 class="title">Capítulo 6. Mantenimient
 o de Software</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Instale el software mínimo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">6.2. Planifique y configure actualizaciones de seguridad</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">6.3. Ajustando las actualizaciones automáticas</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">6.4. Instale paquetes identificados desde repositorios conocidos</a></span></dt></dl></div><div class="para">
 		Una manutención adecuada del software es extremadamente importante a la hora de asegurar un sistema. Es fundamental enmendar software que presenta un fallo en el momento inmediato a la aparición de la solución, de modo de evitar que atacantes que conocen ese fallo, lo aprovechen y se infiltren en su sistema.
 	</div><div class="section" title="6.1. Instale el software mínimo" id="sect-Security_Guide-Software_Maintenance-Install_Minimal_Software"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">6.1. Instale el software mínimo</h2></div></div></div><div class="para">
 			La mejor forma de proceder es instalando solo los paquetes que se van a utilizar, ya que cada pieza de software en su computadora posiblemente pueda contener algún tipo de debilidad. Si está realizando una instalación desde un DVD, dese la oportunidad de elegir exactamente qué paquetes quiere instalar en este proceso. Si se da cuenta que necesita otro paquete, siempre puede agregárselo luego al sistema.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/index.html b/public_html/es-ES/Fedora/11/html/Security_Guide/index.html
index bb57142..35a8174 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/index.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/index.html
@@ -1,9 +1,9 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Security Guide</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><meta name="description" content="La Guía de Seguridad Linux está diseñada para asistir a usuarios de Linux en el proceso de aprendizaje y en la realización de prácticas de seguridad en estaciones de trabajo y servidores, para poder así evitar intrusiones locales y remotas, explotaciones, y actividades maliciosas. La Guía de Seguridad Linux detalla la planificación y describe las herramientas involucradas en la creación de un entorno de computación seguro, ya sea para centros de datos, estaciones de trabajo, o el hogar. Con un conocimie
 nto administrativo apropiado, vigilancia, y herramientas, los sistemas ejecutando Linux pueden ser funcionales y al mismo tiempo seguros, frente a los métodos de intrusión y explotación mas comunes." /><link rel="home" href="index.html" title="Security Guide" /><link rel="next" href="pref-Security_Guide-Preface.html" title="Prefacio" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Siguiente</strong></a></li></
 ul><div xml:lang="es-ES" class="book" title="Security Guide" lang="es-ES"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber">11</span></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="id1398530" class="title">Security Guide</h1></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">Una guía para la seguridad en fedora</h2></div><p class="edition">Edición 1.0</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Guía de Seguridad</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><meta name="description" content="La Guía de Seguridad Linux está diseñada para asistir a usuarios de Linux en el proceso de aprendizaje y en la realización de prácticas de seguridad en estaciones de trabajo y servidores, para poder así evitar intrusiones locales y remotas, explotaciones, y actividades maliciosas. La Guía de Seguridad Linux detalla la planificación y describe las herramientas involucradas en la creación de un entorno de computación seguro, ya sea para centros de datos, estaciones de trabajo, o el hogar. Con un conoc
 imiento administrativo apropiado, vigilancia, y herramientas, los sistemas ejecutando Linux pueden ser funcionales y al mismo tiempo seguros, frente a los métodos de intrusión y explotación mas comunes." /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="next" href="pref-Security_Guide-Preface.html" title="Prefacio" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Siguiente</strong></a
 ></li></ul><div xml:lang="es-ES" class="book" title="Guía de Seguridad" lang="es-ES"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber">11</span></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="id1264298" class="title">Guía de Seguridad</h1></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">Una guía para la seguridad en fedora</h2></div><p class="edition">Edición 1.0</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
 		<span class="inlinemediaobject"><object data="Common_Content/images/title_logo.svg" type="image/svg+xml"> Fedora Documentation Project</object></span>
 
-	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="es-ES" class="authorgroup" lang="es-ES"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="id1332200" class="legalnotice"><h1 class="legalnotice">Aviso Legal</h1><div class="para">
+	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="es-ES" class="authorgroup" lang="es-ES"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="id2600686" class="legalnotice"><h1 class="legalnotice">Aviso Legal</h1><div class="para">
 		Copyright <span class="trademark"></span>© 2008 Red Hat, Inc.
 	</div><div class="para">
 		The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at <a href="http://creativecommons.org/licenses/by-sa/3.0/">http://creativecommons.org/licenses/by-sa/3.0/</a>. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
@@ -23,4 +23,4 @@
 		All other trademarks are the property of their respective owners.
 	</div></div></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div class="abstract" title="Resumen"><h6>Resumen</h6><div class="para">
 			La Guía de Seguridad Linux está diseñada para asistir a usuarios de Linux en el proceso de aprendizaje y en la realización de prácticas de seguridad en estaciones de trabajo y servidores, para poder así evitar intrusiones locales y remotas, explotaciones, y actividades maliciosas. La Guía de Seguridad Linux detalla la planificación y describe las herramientas involucradas en la creación de un entorno de computación seguro, ya sea para centros de datos, estaciones de trabajo, o el hogar. Con un conocimiento administrativo apropiado, vigilancia, y herramientas, los sistemas ejecutando Linux pueden ser funcionales y al mismo tiempo seguros, frente a los métodos de intrusión y explotación mas comunes.
-		</div></div></div></div><hr /></div><div class="toc"><dl><dt><span class="preface"><a href="pref-Security_Guide-Preface.html">Prefacio</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1251242">1. Convenciones del Documento</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1251210">1.1. Convenciones Tipográficas</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1467181">1.2. Convenciones del documento</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1552995">1.3. Notas y Advertencias</a></span></dt></dl></dd><dt><span class="section"><a href="We_Need_Feedback.html">2. ¡Necesitamos sus comentarios!</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Security_Overview.html">1. Repaso sobre seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overvi
 ew.html#sect-Security_Guide-Introduction_to_Security">1.1. Introducción a la Seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. ¿Qué es la seguridad en computación?</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Controles de seguridad</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusión</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.2. Evaluación de debilidades</a></span></dt><dd><
 dl><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Pensando como el enemigo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.2.2. Definiendo evaluación y pruebas</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.2.3. Herramientas de evaluación</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.3. Atacantes y vulnerabilidades</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Una breve reseña acerca de los hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_a
 nd_Vulnerabilities-Threats_to_Network_Security.html">1.3.2. Amenazas a la seguridad de la red</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.3.3. Amenazas a la seguridad del servidor</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Ataques y debilidades comunes</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Actualizaciones de seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Actualización de paquetes</a></span></dt><dt><span
  class="section"><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Verificación de paquetes firmados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Instalación de paquetes firmados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. Aplicación de los cambios</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Securing_Your_Network.html">2. Asegurando su Red</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">2.1. Seguridad de la estación de trabajo</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Evaluación de la segurida
 d de la estación de trabajo</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. Seguridad en el BIOS y en el gestor de arranque</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Seguridad de contraseñas</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Controles administrativos</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Servicios de red disponibles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_F
 irewalls">2.1.6. Cortafuegos personales</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Herramientas de comunicación de seguridad mejorada</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">2.2. Seguridad del servidor</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Asegurando los servicios con encapsuladores TCP y xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">2.2.2. Asegurando Portmap</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">2.2.3. Asegurando NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Serv
 er_Security-Securing_NFS.html">2.2.4. Asegurando NFS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">2.2.5. Asegurando el servidor HTTP Apache</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">2.2.6. Asegurando FTP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">2.2.7. Asegurando Sendmail</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">2.2.8. Verificar qué puertos están abiertos</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Intr
 oduction">2.3.1. Introducción</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">2.3.2. Empezar a utilizar su nueva tarjeta inteligente</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">2.3.4. Cómo funciona el ingreso con tarjeta inteligente</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">2.3.5. Configurar Firefox para la utilización de Kerberos como SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">2.4. Módulos de autenticación conectables (PAM, por las inicia
 les en inglés de Pluggable Authentication Modules)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Ventajas de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">2.4.2. Archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">2.4.3. Formato del archivo de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">2.4.4. Ejemplos de archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">2.4.5. CreaciÃ
 ³n de los módulos PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">2.4.6. PAM y el cacheo de la credencial administrativa</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html">2.4.7. PAM y la propiedad de los dispositivos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">2.4.8. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">2.5. Encapsuladores TCP y xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. Encapsuladores TCP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wr
 appers_and_xinetd-TCP_Wrappers_Configuration_Files.html">2.5.2. Archivos de configuración de los encapsuladores TCP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">2.5.4. Archivos de configuración de xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">2.5.5. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. ¿Qué es Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">2.6.2. Terminología de Kerberos</a></span></dt><d
 t><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">2.6.3. Como Funciona Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">2.6.4. Kerberos y PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">2.6.5. Configurando un servidor Kerberos 5</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">2.6.6. Configuración de un Cliente Kerberos 5</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">2.6.7. Mapeo dominio-a-reinado</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">2.6.8. Configurando KDCs secundarios</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">2.6.9. Config
 urando la autenticación cruzada de reinados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">2.6.10. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html">2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. ¿Cómo funciona una VPN?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html">2.7.2. VPNs y Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPs
 ec_Connection.html">2.7.4. Creando una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html">2.7.5. Instalación de IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html">2.7.6. Configuración de IPsec equipo-a-equipo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html">2.7.7. Configuración IPsec red-a-red</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html">2.7.8. Iniciar y detener una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html">2.8. Cortafuegos</a></span></dt><dd><dl><dt><span class="section">
 <a href="sect-Security_Guide-Firewalls.html#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter e IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html">2.8.2. Configuración básica de un cortafuego</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Using_IPTables.html">2.8.3. Uso de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html">2.8.4. Filtrado común de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html">2.8.5. Reglas <code class="computeroutput">FORWARD</code> y <acronym class="acronym">NAT</acronym></a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html">2.8.6. Software malicioso y suplantación de direcciones IP </a></span></dt><dt><span class="
 section"><a href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html">2.8.7. IPTables y el seguimiento de la conexión</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPv6.html">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Additional_Resources.html">2.8.9. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-IPTables.html">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-IPTables.html#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Filtrado de Paquete</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html">2.9.2. Diferencias entre IPTables e IPChains</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html">2.9.3. Opciones de la línea de comandos de IPTables</
 a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html">2.9.4. Guardando las reglas de IPTalbes</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html">2.9.5. Programas de control de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html">2.9.6. IPTables e IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Additional_Resources.html">2.9.7. Recursos adicionales</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Encryption.html">3. Encriptación</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Datos en reposo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html">3.2. Encriptació
 n completa del disco</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html">3.3. Encriptación basada en archivo</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">3.4. Datos en movimiento</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html">3.5. Redes privadas virtuales (VPNs)</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fed
 ora">3.7.1. Implementación de LUKS en Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html">3.7.2. Encriptación manual de directorios</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html">3.7.3. Instrucciones paso a paso</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html">3.7.4. Lo que acaba de realizar</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html">3.7.5. Enlaces de interés</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html">3.8. Archivos Encriptados 7-Zip</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip
 _Encrypted_Archives.html#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. Instalación de 7-Zip en Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html">3.8.2. Instrucciones paso a paso para su instalación</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html">3.8.3. Instrucciones paso a paso para su utilización</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html">3.8.4. Elementos para prestar atención</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html">3.9. Utilizando GNU Privacy Guard (GnuPG)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.
 9.1. Crear claves GPG en GNOME</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html">3.9.2. Crear claves GPG en KDE</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html">3.9.3. Crear una clave GPG mediante la línea de comandos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html">3.9.4. Acerca del encriptado de la clave pública</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html">4. Principios Generales sobre la Seguridad de la Información</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Consejos, Guías y Herramientas
 </a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Secure_Installation.html">5. Instalación segura</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Particiones del disco</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">5.2. Utilice encriptado de particiones mediante LUKS</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Software_Maintenance.html">6. Mantenimiento de Software</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Instale el software mínimo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">6.2. Planifique 
 y configure actualizaciones de seguridad</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">6.3. Ajustando las actualizaciones automáticas</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">6.4. Instale paquetes identificados desde repositorios conocidos</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-References.html">7. Referencias</a></span></dt></dl></div></div><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Siguiente</strong>Prefacio</a></li></ul></body></html>
+		</div></div></div></div><hr /></div><div class="toc"><dl><dt><span class="preface"><a href="pref-Security_Guide-Preface.html">Prefacio</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1412509">1. Convenciones del Documento</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1412487">1.1. Convenciones Tipográficas</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1243651">1.2. Convenciones del documento</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1437051">1.3. Notas y Advertencias</a></span></dt></dl></dd><dt><span class="section"><a href="We_Need_Feedback.html">2. ¡Necesitamos sus comentarios!</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Security_Overview.html">1. Repaso sobre seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overvi
 ew.html#sect-Security_Guide-Introduction_to_Security">1.1. Introducción a la Seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. ¿Qué es la seguridad en computación?</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Controles de seguridad</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusión</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.2. Evaluación de debilidades</a></span></dt><dd><
 dl><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Pensando como el enemigo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.2.2. Definiendo evaluación y pruebas</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.2.3. Herramientas de evaluación</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.3. Atacantes y vulnerabilidades</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Una breve reseña acerca de los hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_a
 nd_Vulnerabilities-Threats_to_Network_Security.html">1.3.2. Amenazas a la seguridad de la red</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.3.3. Amenazas a la seguridad del servidor</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Ataques y debilidades comunes</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Actualizaciones de seguridad</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Actualización de paquetes</a></span></dt><dt><span
  class="section"><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Verificación de paquetes firmados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Instalación de paquetes firmados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. Aplicación de los cambios</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Securing_Your_Network.html">2. Asegurando su Red</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">2.1. Seguridad de la estación de trabajo</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Evaluación de la segurida
 d de la estación de trabajo</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. Seguridad en el BIOS y en el gestor de arranque</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Seguridad de contraseñas</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Controles administrativos</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Servicios de red disponibles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_F
 irewalls">2.1.6. Cortafuegos personales</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Herramientas de comunicación de seguridad mejorada</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">2.2. Seguridad del servidor</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Asegurando los servicios con encapsuladores TCP y xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">2.2.2. Asegurando Portmap</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">2.2.3. Asegurando NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Serv
 er_Security-Securing_NFS.html">2.2.4. Asegurando NFS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">2.2.5. Asegurando el servidor HTTP Apache</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">2.2.6. Asegurando FTP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">2.2.7. Asegurando Sendmail</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">2.2.8. Verificar qué puertos están abiertos</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Intr
 oduction">2.3.1. Introducción</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">2.3.2. Empezar a utilizar su nueva tarjeta inteligente</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">2.3.4. Cómo funciona el ingreso con tarjeta inteligente</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">2.3.5. Configurar Firefox para la utilización de Kerberos como SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">2.4. Módulos de autenticación conectables (PAM, por las inicia
 les en inglés de Pluggable Authentication Modules)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Ventajas de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">2.4.2. Archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">2.4.3. Formato del archivo de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">2.4.4. Ejemplos de archivos de configuración de PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">2.4.5. CreaciÃ
 ³n de los módulos PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">2.4.6. PAM y el cacheo de la credencial administrativa</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html">2.4.7. PAM y la propiedad de los dispositivos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">2.4.8. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">2.5. Encapsuladores TCP y xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. Encapsuladores TCP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wr
 appers_and_xinetd-TCP_Wrappers_Configuration_Files.html">2.5.2. Archivos de configuración de los encapsuladores TCP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">2.5.4. Archivos de configuración de xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">2.5.5. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. ¿Qué es Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">2.6.2. Terminología de Kerberos</a></span></dt><d
 t><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">2.6.3. Como Funciona Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">2.6.4. Kerberos y PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">2.6.5. Configurando un servidor Kerberos 5</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">2.6.6. Configuración de un Cliente Kerberos 5</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">2.6.7. Mapeo dominio-a-reinado</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">2.6.8. Configurando KDCs secundarios</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">2.6.9. Config
 urando la autenticación cruzada de reinados</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">2.6.10. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html">2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. ¿Cómo funciona una VPN?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html">2.7.2. VPNs y Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPs
 ec_Connection.html">2.7.4. Creando una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html">2.7.5. Instalación de IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html">2.7.6. Configuración de IPsec equipo-a-equipo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html">2.7.7. Configuración IPsec red-a-red</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html">2.7.8. Iniciar y detener una conexión <abbr class="abbrev">IPsec</abbr></a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html">2.8. Cortafuegos</a></span></dt><dd><dl><dt><span class="section">
 <a href="sect-Security_Guide-Firewalls.html#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter e IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html">2.8.2. Configuración básica de un cortafuego</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Using_IPTables.html">2.8.3. Uso de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html">2.8.4. Filtrado común de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html">2.8.5. Reglas <code class="computeroutput">FORWARD</code> y <acronym class="acronym">NAT</acronym></a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html">2.8.6. Software malicioso y suplantación de direcciones IP </a></span></dt><dt><span class="
 section"><a href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html">2.8.7. IPTables y el seguimiento de la conexión</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPv6.html">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Additional_Resources.html">2.8.9. Recursos adicionales</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-IPTables.html">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-IPTables.html#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Filtrado de Paquete</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html">2.9.2. Diferencias entre IPTables e IPChains</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html">2.9.3. Opciones de la línea de comandos de IPTables</
 a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html">2.9.4. Guardando las reglas de IPTalbes</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html">2.9.5. Programas de control de IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html">2.9.6. IPTables e IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Additional_Resources.html">2.9.7. Recursos adicionales</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Encryption.html">3. Encriptación</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Datos en reposo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html">3.2. Encriptació
 n completa del disco</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html">3.3. Encriptación basada en archivo</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">3.4. Datos en movimiento</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html">3.5. Redes privadas virtuales (VPNs)</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fed
 ora">3.7.1. Implementación de LUKS en Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html">3.7.2. Encriptación manual de directorios</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html">3.7.3. Instrucciones paso a paso</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html">3.7.4. Lo que acaba de realizar</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html">3.7.5. Enlaces de interés</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html">3.8. Archivos Encriptados 7-Zip</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip
 _Encrypted_Archives.html#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. Instalación de 7-Zip en Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html">3.8.2. Instrucciones paso a paso para su instalación</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html">3.8.3. Instrucciones paso a paso para su utilización</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html">3.8.4. Elementos para prestar atención</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html">3.9. Utilizando GNU Privacy Guard (GnuPG)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.
 9.1. Crear claves GPG en GNOME</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html">3.9.2. Crear claves GPG en KDE</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html">3.9.3. Crear una clave GPG mediante la línea de comandos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html">3.9.4. Acerca del encriptado de la clave pública</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html">4. Principios Generales sobre la Seguridad de la Información</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Consejos, Guías y Herramientas
 </a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Secure_Installation.html">5. Instalación segura</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Particiones del disco</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">5.2. Utilice encriptado de particiones mediante LUKS</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Software_Maintenance.html">6. Mantenimiento de Software</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Instale el software mínimo</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">6.2. Planifique 
 y configure actualizaciones de seguridad</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">6.3. Ajustando las actualizaciones automáticas</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">6.4. Instale paquetes identificados desde repositorios conocidos</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-References.html">7. Referencias</a></span></dt></dl></div></div><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Siguiente</strong>Prefacio</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/pref-Security_Guide-Preface.html b/public_html/es-ES/Fedora/11/html/Security_Guide/pref-Security_Guide-Preface.html
index 5a946ac..53deb5c 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/pref-Security_Guide-Preface.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/pref-Security_Guide-Preface.html
@@ -1,10 +1,10 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Prefacio</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="index.html" title="Security Guide" /><link rel="next" href="We_Need_Feedback.html" title="2. ¡Necesitamos sus comentarios!" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src=
 "Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="We_Need_Feedback.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="preface" title="Prefacio" id="pref-Security_Guide-Preface" lang="es-ES"><div class="titlepage"><div><div><h1 class="title">Prefacio</h1></div></div></div><div xml:lang="es-ES" class="section" title="1. Convenciones del Documento" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="id1251242">1. Convenciones del Documento</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Prefacio</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="index.html" title="Guía de Seguridad" /><link rel="prev" href="index.html" title="Guía de Seguridad" /><link rel="next" href="We_Need_Feedback.html" title="2. ¡Necesitamos sus comentarios!" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.or
 g"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="We_Need_Feedback.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="preface" title="Prefacio" id="pref-Security_Guide-Preface" lang="es-ES"><div class="titlepage"><div><div><h1 class="title">Prefacio</h1></div></div></div><div xml:lang="es-ES" class="section" title="1. Convenciones del Documento" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="id1412509">1. Convenciones del Documento</h2></div></div></div><div class="para">
 		Este manual utiliza varias convenciones para resaltar algunas palabras y frases y llamar la atención sobre ciertas partes específicas de información.
 	</div><div class="para">
 		En ediciones PDF y de papel, este manual utiliza tipos de letra procedentes de <a href="https://fedorahosted.org/liberation-fonts/">Liberation Fonts</a>. Liberation Fonts también se utilizan en ediciones de HTML si están instalados en su sistema. Si no, se muestran tipografías alternativas pero equivalentes. Nota: Red Hat Enterprise Linux 5 y siguientes incluyen Liberation Fonts predeterminadas.
-	</div><div class="section" title="1.1. Convenciones Tipográficas"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1251210">1.1. Convenciones Tipográficas</h3></div></div></div><div class="para">
+	</div><div class="section" title="1.1. Convenciones Tipográficas"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1412487">1.1. Convenciones Tipográficas</h3></div></div></div><div class="para">
 			Se utilizan cuatro convenciones tipográficas para llamar la atención sobre palabras o frases específicas. Dichas convenciones y las circunstancias en que se aplican son las siguientes:
 		</div><div class="para">
 			<code class="literal">Negrita monoespaciado</code>
@@ -52,7 +52,7 @@
 			Aparte del uso estándar para presentar el título de un trabajo, las itálicas denotan el primer uso de un término nuevo e importante. Por ejemplo:
 		</div><div class="blockquote"><blockquote class="blockquote"><div class="para">
 				Publican es un sistema de publicación de <em class="firstterm">DocBook</em>.
-			</div></blockquote></div></div><div class="section" title="1.2. Convenciones del documento"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1467181">1.2. Convenciones del documento</h3></div></div></div><div class="para">
+			</div></blockquote></div></div><div class="section" title="1.2. Convenciones del documento"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1243651">1.2. Convenciones del documento</h3></div></div></div><div class="para">
 			Los mensajes de salida de la terminal o fragmentos de código fuente se distinguen visualmente del texto circundante.
 		</div><div class="para">
 			Los mensajes de salida enviados a una terminal se muestran en <code class="computeroutput">romano monoespaciado</code> y se presentan así:
@@ -81,7 +81,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs
    }
 }
 
-</pre></div><div class="section" title="1.3. Notas y Advertencias"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1552995">1.3. Notas y Advertencias</h3></div></div></div><div class="para">
+</pre></div><div class="section" title="1.3. Notas y Advertencias"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1437051">1.3. Notas y Advertencias</h3></div></div></div><div class="para">
 			Finalmente, utilizamos tres estilos visuales para llamar la atención sobre la información que de otro modo se podría pasar por alto.
 		</div><div class="note"><h2>Nota</h2><div class="para">
 				Una nota es una sugerencia, atajo o enfoque alternativo para una tarea determinada. Ignorar una nota no debería tener consecuencias negativas, pero podría perderse de algunos trucos que pueden facilitarle las cosas.
@@ -89,4 +89,4 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs
 				Important boxes detail things that are easily missed: configuration changes that only apply to the current session, or services that need restarting before an update will apply. Ignoring a box labeled 'Important' won't cause data loss but may cause irritation and frustration.
 			</div></div><div class="warning"><h2>Advertencia</h2><div class="para">
 				Las advertencias no deben ignorarse. Ignorarlas muy probablemente ocasionará pérdida de datos.
-			</div></div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Anterior</strong>Security Guide</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="We_Need_Feedback.html"><strong>Siguiente</strong>2. ¡Necesitamos sus comentarios!</a></li></ul></body></html>
+			</div></div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Anterior</strong>Guía de Seguridad</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="We_Need_Feedback.html"><strong>Siguiente</strong>2. ¡Necesitamos sus comentarios!</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Books.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Books.html
index 8b120c9..0eb53d2 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Books.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Books.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5.3. Libros relacionados</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Sitios web útiles relacionados con encapsuladores TCP" /><link rel="next" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="t
 oc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.5.3. Libros relacionados" id="sect-Security_Guide-Additional_Resources-Related_Books"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.5.3. Libros relacionados</h4></div></div></div><div class="itemizedlist"><ul><li class="list
 item"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5.3. Libros relacionados</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Sitios web útiles relacionados con encapsuladores TCP" /><link rel="next" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" clas
 s="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.5.3. Libros relacionados" id="sect-Security_Guide-Additional_Resources-Related_Books"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.5.3. Libros relacionados</h4></div></div></div><div class="itemizedlist"><ul><li class="
 listitem"><div class="para">
 						<em class="citetitle">Hacking Linux Exposed</em> por Brian Hatch, James Lee, y George Kurtz; Osbourne/McGraw-Hill — Una herramienta de seguridad excelente con información acerca de encapsuladores TCP y <code class="systemitem">xinetd</code>.
 					</div></li></ul></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Anterior</strong>2.5.5.2. Sitios web útiles relacionados con encap...</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos.html"><strong>Siguiente</strong>2.6. Kerberos</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Documentation.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Documentation.html
index 8345f43..0bedf0d 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Documentation.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Documentation.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9.3. Documentación relacionada</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Sitios web útiles de cortafuego" /><link rel="next" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">Th
 is is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.9.3. Documentación relacionada" id="sect-Security_Guide-Additional_Resources-Related_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.9.3. Documentación relacionada</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div clas
 s="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9.3. Documentación relacionada</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Sitios web útiles de cortafuego" /><link rel="next" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html
 ">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.9.3. Documentación relacionada" id="sect-Security_Guide-Additional_Resources-Related_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.9.3. Documentación relacionada</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div 
 class="para">
 						<em class="citetitle">Red Hat Linux Firewalls</em>, por Bill McCarty; Red Hat Press — un manual de referencia completo para poder levantar cortafuegos de red o de servidores, utilizando tecnología de código abierto para filtrado de paquetes, como por ejemplo Netfilter o <code class="command">iptables</code>. Los temas que se tratan van desde el análisis de logs de cortafuegos, desarrollo de reglas de cortafuegos, y diferentes métodos de personalización del cortafuegos utilizando numerosas herramientas gráficas.
 					</div></li><li class="listitem"><div class="para">
 						<em class="citetitle">Linux Firewalls</em>, por Robert Ziegler; New Riders Press — contiene gran cantidad de información para poder levantar cortafuegos utilizando tanto <code class="command">ipchains</code> de un kernel 2.2, como Netfilter o <code class="command">iptables</code>. También son tratados otros temas relacionados con la seguridad, como problemas con el acceso remoto, o detección de intrusos en el sistema.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html
index d92a037..1a39344 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9.2. Sitios web útiles de cortafuego</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Recursos adicionales" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Documentación relacionada" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="t
 oc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.9.2. Sitios web útiles de cortafuego" id="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.9.2. Sitios web útiles de cortafuego</h4></div></div
 ></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9.2. Sitios web útiles de cortafuego</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Recursos adicionales" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Documentación relacionada" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" clas
 s="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.9.2. Sitios web útiles de cortafuego" id="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.9.2. Sitios web útiles de cortafuego</h4></div><
 /div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://www.netfilter.org/">http://www.netfilter.org/</a> — La página oficial del proyecto Netfilter e <code class="command">iptables</code>.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.tldp.org/">http://www.tldp.org/</a> — El Proyecto de Documentación de Linux contiene varias guías útiles sobre la creación y administración de cortafuegos.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html
index 3ec3ede..7943c9b 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.7.2. Sitios web útiles sobre IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Recursos adicionales" /><link rel="next" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an 
 iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Encryption.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.7.2. Sitios web útiles sobre IPTables" id="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.7.2. Sitios web útiles sobre IPTables</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="pa
 ra">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.7.2. Sitios web útiles sobre IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Recursos adicionales" /><link rel="next" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is
  an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Encryption.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.7.2. Sitios web útiles sobre IPTables" id="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.7.2. Sitios web útiles sobre IPTables</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class
 ="para">
 						<a href="http://www.netfilter.org/">http://www.netfilter.org/</a> — El hogar del proyecto netfilter/iptables. Contiene información ordenada acerca de <code class="command">iptables</code>, incluyendo un FAQ que describe problemas específicos, y varias guías útiles realizadas por Rusty Russell, el encargado del cortafuegos para IP de Linux. Los diferentes tutoriales del sitio abarcan diferentes temas, como ser por ejemplo, una descripción de los conceptos básicos de trabajo en redes, filtros de paquetes del kernel y configuraciones NAT.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.linuxnewbie.org/nhf/Security/IPtables_Basics.html">http://www.linuxnewbie.org/nhf/Security/IPtables_Basics.html</a> — Una introducción acerca de cómo los paquetes se trasladan dentro del kernel de Linux, más una introducción para saber cómo construir comandos básicos de <code class="command">iptables</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html
index 37f042d..0550f99 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.10.2. Páginas web útiles sobre Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Recursos adicionales" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /></head><body class="toc_embeded "><div id="
 tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.10.2. Páginas web útiles sobre Kerberos" id="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.6.10.2. Página
 s web útiles sobre Kerberos</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.10.2. Páginas web útiles sobre Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Recursos adicionales" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /></head><body class="toc_embeded "><div 
 id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.10.2. Páginas web útiles sobre Kerberos" id="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.6.10.2. Pá
 ginas web útiles sobre Kerberos</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://web.mit.edu/kerberos/www/">http://web.mit.edu/kerberos/www/</a> — <em class="citetitle">Kerberos: El Protocolo de Autenticación de Red</em> del MIT.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html">http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html</a> — Las Preguntas Frecuentes de Kerberos (FAQ).
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html
index 21e0f42..5245990 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.8.2. Sitios web útiles sobre PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Recursos adicionales" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><i
 frame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.8.2. Sitios web útiles sobre PAM" id="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.8.2. Sitios web útiles so
 bre PAM</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.8.2. Sitios web útiles sobre PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Recursos adicionales" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc
 "><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.8.2. Sitios web útiles sobre PAM" id="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.8.2. Sitios web útile
 s sobre PAM</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://www.kernel.org/pub/linux/libs/pam/">http://www.kernel.org/pub/linux/libs/pam/</a> — El sitio web principal de distribución del proyecto Linux-PAM, que contiene información relacionada con varios módulos PAM, una sección con respuestas a las preguntas más usuales (FAQ, por las siglas en inglés de Frequently Asked Questions), y documentación adicional acerca de PAM.
 					</div><div class="note"><h2>Nota</h2><div class="para">
 							La documentación en el sitio web de arriba es para la última versión de desarrollo lanzada de PAM y puede no ser 100% precisa para la versión de PAM incluida en Fedora.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html
index 671ce36..143bfe8 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5.2. Sitios web útiles relacionados con encapsuladores TCP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Recursos adicionales" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Libros relacionados" /></head><body class="toc_embeded "><div id="tocdiv" class="
 toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.5.2. Sitios web útiles relacionados con encapsuladores TCP" id="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 clas
 s="title">2.5.5.2. Sitios web útiles relacionados con encapsuladores TCP</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5.2. Sitios web útiles relacionados con encapsuladores TCP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Recursos adicionales" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Recursos adicionales" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Libros relacionados" /></head><body class="toc_embeded "><div id="tocdiv" cla
 ss="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.5.2. Sitios web útiles relacionados con encapsuladores TCP" id="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 
 class="title">2.5.5.2. Sitios web útiles relacionados con encapsuladores TCP</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://www.xinetd.org">http://www.xinetd.org/</a> — El sitio principal de <code class="systemitem">xinetd</code>, que contiene archivos de configuración a modo de ejemplo, lista completa de herramientas, y una sección informativa de preguntas frecuentes (FAQ, por las iniciales en inglés de Frecuently Asked Questions).
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.docstoc.com/docs/2133633/An-Unofficial-Xinetd-Tutorial">http://www.docstoc.com/docs/2133633/An-Unofficial-Xinetd-Tutorial</a> — Un tutorial en el que se explican diferentes formas de optimizar los archivos de configuración de <code class="systemitem">xinetd</code> establecidos por defecto, de manera de poder alcanzar objetivos de seguridad específicos.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html
index c53d5fd..4d97be6 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.2. Opciones para el control de acceso</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. Alteración de los archivos de configuración de xinetd" /><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. Alteración de los archivos de configuración de xinetd" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_an
 d_Redirection_Options.html" title="2.5.4.3.3. Opciones de unión y redirección" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4.3.2. Opciones para e
 l control de acceso" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.2. Opciones para el control de acceso</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.2. Opciones para el control de acceso</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. Alteración de los archivos de configuración de xinetd" /><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. Alteración de los archivos de configuración de xinetd" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Bindin
 g_and_Redirection_Options.html" title="2.5.4.3.3. Opciones de unión y redirección" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4.3.2. Opciones pa
 ra el control de acceso" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.2. Opciones para el control de acceso</h5></div></div></div><div class="para">
 					Users of <code class="systemitem">xinetd</code> services can choose to use the TCP Wrappers hosts access rules, provide access control via the <code class="systemitem">xinetd</code> configuration files, or a mixture of both. Refer to <a class="xref" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Archivos de configuración de los encapsuladores TCP">Sección 2.5.2, “Archivos de configuración de los encapsuladores TCP”</a> for more information about TCP Wrappers hosts access control files.
 				</div><div class="para">
 					En esta sección se desarrolla la utilización de <code class="systemitem">xinetd</code> para controlar el acceso a los servicios.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html
index a691116..d9c7d3b 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.3. Opciones de unión y redirección</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. Alteración de los archivos de configuración de xinetd" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Opciones para el control de acceso" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" 
 title="2.5.4.3.4. Opciones de administración de recursos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4.3.3. Opciones de unión y redirección" id="sect-S
 ecurity_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.3. Opciones de unión y redirección</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.3. Opciones de unión y redirección</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. Alteración de los archivos de configuración de xinetd" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Opciones para el control de acceso" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.ht
 ml" title="2.5.4.3.4. Opciones de administración de recursos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4.3.3. Opciones de unión y redirección" id="se
 ct-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.3. Opciones de unión y redirección</h5></div></div></div><div class="para">
 					Los archivos de configuración del servicio <code class="systemitem">xinetd</code> tienen soporte para asociar el servicio con una dirección IP, y redireccionar las peticiones entrantes para ese servicio hacia otra dirección IP, nombre de equipo, o puerto.
 				</div><div class="para">
 					Esta asociación es controlada con la opción <code class="option">bind</code> en el archivo de configuración específico de cada servicio, y enlaza ese servicio con una dirección IP en el sistema. Cuando esto es configurado, la opción <code class="option">bind</code> sólo acepta peticiones para acceder al servicio de la dirección IP correcta. Puede utilizar este método para asociar diferentes servicios con diferentes interfases de acuerdo a sus propias necesidades.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html
index 7c486ef..64ae485 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.4. Opciones de administración de recursos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. Alteración de los archivos de configuración de xinetd" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html" title="2.5.4.3.3. Opciones de unión y redirección" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title
 ="2.5.5. Recursos adicionales" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4.3.4. Opciones de administración de recursos" id="sect-Security_Guide-Altering_xinetd_Co
 nfiguration_Files-Resource_Management_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.4. Opciones de administración de recursos</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.4. Opciones de administración de recursos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. Alteración de los archivos de configuración de xinetd" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html" title="2.5.4.3.3. Opciones de unión y redirección" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" t
 itle="2.5.5. Recursos adicionales" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4.3.4. Opciones de administración de recursos" id="sect-Security_Guide-Altering_xinet
 d_Configuration_Files-Resource_Management_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.4. Opciones de administración de recursos</h5></div></div></div><div class="para">
 					El demonio <code class="systemitem">xinetd</code> puede ofrecer un nivel de protección básico para los ataques de Denegación de Servicio (DoS, por las iniciales en inglés de Denial of Service). La siguiente es una lista de directivas que pueden ayudar a disminuir la efectividad de tales ataques:
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="option">per_source</code> — Establece el número máximo de instancias para un servicio desde cada dirección IP. Acepta solo valores enteros como argumentos y puede ser utilizada tanto en <code class="filename">xinetd.conf</code> como en el archivo de configuración específico del servicio en cuestión del directorio <code class="filename">xinetd.d/</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html
index 3b97468..af7641e 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.2. Amenazas a la seguridad de la red</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Atacantes y vulnerabilidades" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Atacantes y vulnerabilidades" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Amenazas a la seguridad del servidor" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"
 ><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.2. Amenazas a la seguridad de la red" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.
 3.2. Amenazas a la seguridad de la red</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.2. Amenazas a la seguridad de la red</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Atacantes y vulnerabilidades" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Atacantes y vulnerabilidades" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Amenazas a la seguridad del servidor" /></head><body class="toc_embeded "><div id="tocdiv" class="
 toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.2. Amenazas a la seguridad de la red" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title
 ">1.3.2. Amenazas a la seguridad de la red</h3></div></div></div><div class="para">
 			Malas prácticas cuando se configuran los siguientes aspectos de una red pueden aumentar el riesgo de un ataque.
 		</div><div class="section" title="1.3.2.1. Arquitecturas inseguras" id="sect-Security_Guide-Threats_to_Network_Security-Insecure_Architectures"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.2.1. Arquitecturas inseguras</h4></div></div></div><div class="para">
 				Una red mal configurada es el principal punto de ingreso para usuarios no autorizados. Dejar una red local, a cuyos usuarios conocemos, abierta y vulnerable a la gran inseguridad que representa Internet es casi como dejar una puerta entornada en un barrio de criminales. Tal vez no suceda nada en un determinado período de tiempo, pero <span class="emphasis"><em>en algún momento</em></span>, alguien va a aprovechar esa oportunidad
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html
index 4ec02b3..2d74530 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3. Amenazas a la seguridad del servidor</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Atacantes y vulnerabilidades" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Amenazas a la seguridad de la red" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Servicios no parchados" /></head><body class="toc_embeded "><div id="tocd
 iv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.3. Amenazas a la seguridad del servidor" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security"><div class="titlepage"><div><div keep-together.within-co
 lumn="always"><h3 class="title">1.3.3. Amenazas a la seguridad del servidor</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3. Amenazas a la seguridad del servidor</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Atacantes y vulnerabilidades" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Amenazas a la seguridad de la red" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Servicios no parchados" /></head><body class="toc_embeded "><div id="
 tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.3. Amenazas a la seguridad del servidor" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security"><div class="titlepage"><div><div keep-together.withi
 n-column="always"><h3 class="title">1.3.3. Amenazas a la seguridad del servidor</h3></div></div></div><div class="para">
 			La seguridad del servidor es tan importante como la seguridad de la red, ya que los servidores con frecuencia retienen gran parte de la información vital de una determianda organización. Si el servidor es vulnerado, todos sus contenidos pueden quedar a disposición del atacante para ser sustraídos o manipulados en su totalidad. Las secciones siguientes hacen referencia a los problemas principales.
 		</div><div class="section" title="1.3.3.1. Servicios no usados y puertos abiertos" id="sect-Security_Guide-Threats_to_Server_Security-Unused_Services_and_Open_Ports"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.3.1. Servicios no usados y puertos abiertos</h4></div></div></div><div class="para">
 				Una instalación completa de Fedora contiene más de 1000 aplicaciones y bibliotecas de paquetes. Sin embargo, muchos administradores de servidores eligen no instalar todos los paquetes de la distribución, y prefieren en su lugar realizar una instalación de los paquetes básicos, incluyendo algunas aplicaciones de servidor.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html
index b695c16..e76ad21 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Atacantes y vulnerabilidades" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Servicios inseguros en sí mismos" /><link rel="next" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Aplicacion
 es de tipo cliente vulnerables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareñ
 os" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Atacantes y vulnerabilidades" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Servicios inseguros en sí mismos" /><link rel="next" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Aplica
 ciones de tipo cliente vulnerables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hoga
 reños" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños</h3></div></div></div><div class="para">
 			Workstations and home PCs may not be as prone to attack as networks or servers, but since they often contain sensitive data, such as credit card information, they are targeted by system crackers. Workstations can also be co-opted without the user's knowledge and used by attackers as "slave" machines in coordinated attacks. For these reasons, knowing the vulnerabilities of a workstation can save users the headache of reinstalling the operating system, or worse, recovering from data theft.
 		</div><div class="section" title="1.3.4.1. Malas contraseñas" id="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Bad_Passwords"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.4.1. Malas contraseñas</h4></div></div></div><div class="para">
 				Bad passwords are one of the easiest ways for an attacker to gain access to a system. For more on how to avoid common pitfalls when creating a password, refer to <a class="xref" href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security" title="2.1.3. Seguridad de contraseñas">Sección 2.1.3, “Seguridad de contraseñas”</a>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities.html
index 28b8c81..8756a37 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3. Atacantes y vulnerabilidades</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticipando sus necesidades futuras" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Amenazas a la seguridad de la red" /></head><body class="toc_embeded "><div id="tocdi
 v" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="1.3. Atacantes y vulnerabilidades" id="sect-Security_Guide-Attackers_and_Vulnerabilities" lang="es-ES"><div class="titlepage"><div><div keep-together.within-colu
 mn="always"><h2 class="title">1.3. Atacantes y vulnerabilidades</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3. Atacantes y vulnerabilidades</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticipando sus necesidades futuras" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Amenazas a la seguridad de la red" /></head><body class="toc_embeded "><div id="t
 ocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="1.3. Atacantes y vulnerabilidades" id="sect-Security_Guide-Attackers_and_Vulnerabilities" lang="es-ES"><div class="titlepage"><div><div keep-together.within-
 column="always"><h2 class="title">1.3. Atacantes y vulnerabilidades</h2></div></div></div><div class="para">
 		Para poder planificar e implementar una buena estrategia de seguridad, tenga en cuenta primero algunos de los problemas que son aprovechados por los atacantes para poder vulnerar los sistemas. Sin embargo, antes de detallar estos problemas, tenemos que definir la terminología utilizada a la hora de identificar a un atacante.
 	</div><div class="section" title="1.3.1. Una breve reseña acerca de los hackers" id="sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.3.1. Una breve reseña acerca de los hackers</h3></div></div></div><div class="para">
 			El significado moderno del término <em class="firstterm">hacker</em> tiene sus orígenes en la década del '60, en el Tech Model Railroad Club del Instituto de Tecnología de Massachusetts (MIT, por las siglas en inglés de Massachusetts Institute of Technology), en donde se diseñaban modelos de trenes a gran escala y con detalles muy específicos. "Hacker" era el nombre con el que se identificaba a los miembros del club capaces de sortear las dificultades que presentaba un determinado problema, o que descubría algún truco útil.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html
index d7da09a..957737f 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.6. Activando el servicio IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. Guardando la configuración" /><link rel="next" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. Uso de IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe i
 d="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2.6. Activando el servicio IPTables" id="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.2.6. Activando el s
 ervicio IPTables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.6. Activando el servicio IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. Guardando la configuración" /><link rel="next" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. Uso de IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifra
 me id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2.6. Activando el servicio IPTables" id="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.2.6. Activando 
 el servicio IPTables</h4></div></div></div><div class="para">
 				Las reglas del cortafuego están solamente activas si el servicio <code class="command">iptables</code> se está ejecutando. Para iniciar manualmente el servicio, use el siguiente comando:
 			</div><pre class="screen">[root at miServidor ~] # service iptables restart
 </pre><div class="para">
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html
index f8ca312..6dc2252 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.2. Habilitando y deshabilitando el cortafuego</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="prev" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Servicios confiables" /></head><body class="toc_embeded 
 "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2.2. Habilitando y deshabilitando el cortafuego" id="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall"><div class="titlepage"><div><div keep-togeth
 er.within-column="always"><h4 class="title">2.8.2.2. Habilitando y deshabilitando el cortafuego</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.2. Habilitando y deshabilitando el cortafuego</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="prev" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Servicios confiables" /></head><body class="toc_embe
 ded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2.2. Habilitando y deshabilitando el cortafuego" id="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall"><div class="titlepage"><div><div keep-to
 gether.within-column="always"><h4 class="title">2.8.2.2. Habilitando y deshabilitando el cortafuego</h4></div></div></div><div class="para">
 				Seleccione una de las opciones siguientes para el cortafuego:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<span class="guilabel"><strong>Deshabilitado</strong></span> — Deshabilitar el cortafuegos proporciona un acceso completo a su sistema y no se realiza ninguna verificación de seguridad. Esto debe ser seleccionado sólo si está ejecutando una red segura (no Internet), o necesite configurar un cortafuego personalizado utilizando la herramienta de la línea de comandos iptables.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html
index dbb538f..18a8cb9 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.4. Otros Puertos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Servicios confiables" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. Guardando la configuración" /></head><body class="toc_embeded "><div id="tocdiv" class="toc
 "><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2.4. Otros Puertos" id="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.2.4. Otros Puertos</h4><
 /div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.4. Otros Puertos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Servicios confiables" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. Guardando la configuración" /></head><body class="toc_embeded "><div id="tocdiv" class=
 "toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2.4. Otros Puertos" id="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.2.4. Otros Puertos</
 h4></div></div></div><div class="para">
 				La <span class="application"><strong>herramienta de configuración de cortafuegos</strong></span> incluye una sección de <span class="guilabel"><strong>Otros Puertos</strong></span> para especificar puertos IP personalizados de modo tal de considerarlos como seguros por <code class="command">iptables</code>. Por ejemplo, para permitir que protocolos IRC o de impresión a través de Internet (IPP, por las siglas en inglés de Internet Printing Protocol) pasen a través del cortafuegos, añada la siguiente línea a la sección de <span class="guilabel"><strong>Other ports</strong></span>:
 			</div><div class="para">
 				<code class="computeroutput">194:tcp,631:tcp</code>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html
index 66c655d..801f0a1 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.5. Guardando la configuración</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Otros Puertos" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Activando el servicio IPTables" /></head><body class="toc_embeded "><div id="t
 ocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2.5. Guardando la configuración" id="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings"><div class="titlepage"><div><div keep-together.within-column="always">
 <h4 class="title">2.8.2.5. Guardando la configuración</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.5. Guardando la configuración</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Otros Puertos" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Activando el servicio IPTables" /></head><body class="toc_embeded "><div i
 d="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2.5. Guardando la configuración" id="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings"><div class="titlepage"><div><div keep-together.within-column="alwa
 ys"><h4 class="title">2.8.2.5. Guardando la configuración</h4></div></div></div><div class="para">
 				Haga clic en <span class="guibutton"><strong>OK</strong></span> para guardar los cambios y activar o desactivar el cortafuegos. Si fue seleccionado <span class="guilabel"><strong>Activar cortafuegos</strong></span>, las opciones seleccionadas serán trasladadas a los comandos <code class="command">iptables</code> y escritos en el archivo <code class="filename">/etc/sysconfig/iptables</code>. El servicio <code class="command">iptables</code> es también iniciado de modo que el cortafuegos sea activado inmediatamente luego de guardar las opciones seleccionadas. Si fue seleccionado <span class="guilabel"><strong>Desactivar cortafuegos</strong></span>, el archivo <code class="filename">/etc/sysconfig/iptables</code> es eliminado y el servicio <code class="command">iptables</code> es inmediatamente detenido.
 			</div><div class="para">
 				Las opciones seleccionadas son también escritas al archivo <code class="filename">/etc/sysconfig/system-config-securitylevel</code> para que la configuración pueda restaurarse la próxima vez que se inicie la aplicación. No edite este archivo a mano.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html
index 95576d8..284b8ec 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.3. Servicios confiables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Habilitando y deshabilitando el cortafuego" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Otros Puertos" /></head><body class="toc_embeded "><
 div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2.3. Servicios confiables" id="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services"><div class="titlepage"><div><div keep-together.within-column="alway
 s"><h4 class="title">2.8.2.3. Servicios confiables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.3. Servicios confiables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Habilitando y deshabilitando el cortafuego" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Otros Puertos" /></head><body class="toc_embeded
  "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2.3. Servicios confiables" id="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services"><div class="titlepage"><div><div keep-together.within-column="a
 lways"><h4 class="title">2.8.2.3. Servicios confiables</h4></div></div></div><div class="para">
 				Habilitando opciones en la lista de <span class="guilabel"><strong>Servicios confiables</strong></span> le permite al servicio especificado pasar a través del cortafuego.
 			</div><div class="variablelist"><dl><dt><span class="term"><span class="guilabel"><strong>WWW (HTTP)</strong></span></span></dt><dd><div class="para">
 							El protocolo HTTP es utilizado por Apache (y por otros servidores Web) para ofrecer páginas web. Si tiene pensado hacer que su servidor web esté disponible al público en general, tilde esta casilla. Esta opción no es requerida para ver páginas en forma local, o para desarrollar páginas web. Este servicio requiere que el paquete <code class="filename">httpd</code> esté disponible.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html
index be78628..1515987 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.2. Opciones de comandos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.3.3. Opciones de parámetros de IPTables" /></head><body class=
 "toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.2. Opciones de comandos" id="sect-Security_Guide-Command_Options_for_IPTables-Command_Options"><div class="titlepage"><div><div keep-together.within-column="al
 ways"><h4 class="title">2.9.3.2. Opciones de comandos</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.2. Opciones de comandos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.3.3. Opciones de parámetros de IPTables" /></head><body cl
 ass="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.2. Opciones de comandos" id="sect-Security_Guide-Command_Options_for_IPTables-Command_Options"><div class="titlepage"><div><div keep-together.within-column
 ="always"><h4 class="title">2.9.3.2. Opciones de comandos</h4></div></div></div><div class="para">
 				Las opciones de comando dan instrucciones a <code class="command">iptables</code> para que realice una acción específica. Solo una opción de comando es permitida para cada comando <code class="command">iptables</code>. Con la excepción del comando help, todos los demás deben ser escritos con caracteres mayúsculos.
 			</div><div class="para">
 				Los comandos de <code class="command">iptables</code> son los siguientes:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html
index da3ddd5..34598d3 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4. Opciones de coincidencia de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.3.3. Opciones de parámetros de IPTables" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.3.4.2. Protocolo UDP" /></head><body class="toc_embeded "
 ><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.4. Opciones de coincidencia de IPTables" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options"><div class="titlepage"><div><div keep-together.within-col
 umn="always"><h4 class="title">2.9.3.4. Opciones de coincidencia de IPTables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4. Opciones de coincidencia de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.3.3. Opciones de parámetros de IPTables" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.3.4.2. Protocolo UDP" /></head><body class="toc_embed
 ed "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.4. Opciones de coincidencia de IPTables" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options"><div class="titlepage"><div><div keep-together.within
 -column="always"><h4 class="title">2.9.3.4. Opciones de coincidencia de IPTables</h4></div></div></div><div class="para">
 				Different network protocols provide specialized matching options which can be configured to match a particular packet using that protocol. However, the protocol must first be specified in the <code class="command">iptables</code> command. For example, <code class="option">-p <em class="replaceable"><code>&lt;protocol-name&gt;</code></em></code> enables options for the specified protocol. Note that you can also use the protocol ID, instead of the protocol name. Refer to the following examples, each of which have the same effect:
 			</div><pre class="screen"><code class="command"> iptables -A INPUT -p icmp --icmp-type any -j ACCEPT </code>
 </pre><pre class="screen"><code class="command"> iptables -A INPUT -p 5813 --icmp-type any -j ACCEPT </code>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html
index 8bf0d24..7f63a97 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.3. Opciones de parámetros de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.3.2. Opciones de comandos" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. Opciones de coincidencia de IPTables" /></head><body class="toc
 _embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.3. Opciones de parámetros de IPTables" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options"><div class="titlepage"><div><div keep-t
 ogether.within-column="always"><h4 class="title">2.9.3.3. Opciones de parámetros de IPTables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.3. Opciones de parámetros de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.3.2. Opciones de comandos" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. Opciones de coincidencia de IPTables" /></head><body class=
 "toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.3. Opciones de parámetros de IPTables" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options"><div class="titlepage"><div><div ke
 ep-together.within-column="always"><h4 class="title">2.9.3.3. Opciones de parámetros de IPTables</h4></div></div></div><div class="para">
 				Ciertos comandos de <code class="command">iptables</code>, incluyen aquellos para agregar, adjuntar, borrar, insertar o borrar reglas dentro de una cadena particular, que requieren varios parámetros para construir una regla de filtrado de paquetes.
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="option">-c</code> — Reinicia los contadores de una regla particular. Este parámetro acepta las opciones <code class="option">PKTS</code> y <code class="option">BYTES</code> para especificar qué contadores resetear.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html
index 738bfc7..c67321b 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.6. Opciones de listado</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.3.5. Opciones de destino" /><link rel="next" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.4. Guardando las reglas de IPTalbes" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifra
 me id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.6. Opciones de listado" id="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.3.6. Opciones de listado</h4></div></div>
 </div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.6. Opciones de listado</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.3.5. Opciones de destino" /><link rel="next" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.4. Guardando las reglas de IPTalbes" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><
 iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.6. Opciones de listado" id="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.3.6. Opciones de listado</h4></div></
 div></div><div class="para">
 				The default list command, <code class="command">iptables -L [&lt;chain-name&gt;]</code>, provides a very basic overview of the default filter table's current chains. Additional options provide more information:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="option">-v</code> — Muestra información adicional, como por ejemplo la cantidad de paquetes y los bytes que ha procesado cada cadena, la cantidad de paquetes y los bytes que se ha correspondido con cada regla, y qué interfases se aplican a una regla determinada.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html
index d3b3156..d5713f7 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.5. Opciones de destino</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.3.4.4. Módulos adicionales para opciones de coincidencia" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.3.6. Opciones de listado" /></head><body class="t
 oc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.5. Opciones de destino" id="sect-Security_Guide-Command_Options_for_IPTables-Target_Options"><div class="titlepage"><div><div keep-together.within-column="
 always"><h4 class="title">2.9.3.5. Opciones de destino</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.5. Opciones de destino</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.3.4.4. Módulos adicionales para opciones de coincidencia" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.3.6. Opciones de listado" /></head><body clas
 s="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.5. Opciones de destino" id="sect-Security_Guide-Command_Options_for_IPTables-Target_Options"><div class="titlepage"><div><div keep-together.within-colu
 mn="always"><h4 class="title">2.9.3.5. Opciones de destino</h4></div></div></div><div class="para">
 				Cuando un paquete concuerde con una regla en particular, la regla puede dirigir el paquete hacia un número de destinos diferentes determinados por la acción apropiada. Cada cadena tiene un objetivo establecido por defecto, que será utilizado si ninguna de las reglas en esa cadena concuerdan con un paquete, o si ninguna de las reglas que concuerdan con el paquete especifica un destino.
 			</div><div class="para">
 				Los siguientes son los destinos estándares:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Common_Exploits_and_Attacks.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Common_Exploits_and_Attacks.html
index 138358c..e9d376d 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Common_Exploits_and_Attacks.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Common_Exploits_and_Attacks.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.4. Ataques y debilidades comunes</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /><link rel="prev" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Aplicaciones de tipo cliente vulnerables" /><link rel="next" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifr
 ame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Security_Updates.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="1.4. Ataques y debilidades comunes" id="sect-Security_Guide-Common_Exploits_and_Attacks" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.4. Ata
 ques y debilidades comunes</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.4. Ataques y debilidades comunes</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /><link rel="prev" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Aplicaciones de tipo cliente vulnerables" /><link rel="next" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad" /></head><body class="toc_embeded "><div id="tocdiv" class="toc">
 <iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Security_Updates.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="1.4. Ataques y debilidades comunes" id="sect-Security_Guide-Common_Exploits_and_Attacks" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.4.
  Ataques y debilidades comunes</h2></div></div></div><div class="para">
 		<a class="xref" href="sect-Security_Guide-Common_Exploits_and_Attacks.html#tabl-Security_Guide-Common_Exploits_and_Attacks-Common_Exploits" title="Tabla 1.1. Debilidades comunes">Tabla 1.1, “Debilidades comunes”</a> details some of the most common exploits and entry points used by intruders to access organizational network resources. Key to these common exploits are the explanations of how they are performed and how administrators can properly safeguard their network against such attacks.
 	</div><div class="table" title="Tabla 1.1. Debilidades comunes" id="tabl-Security_Guide-Common_Exploits_and_Attacks-Common_Exploits"><div class="table-contents"><table summary="Debilidades comunes" border="1"><colgroup><col width="20%" /><col width="40%" /><col width="40%" /></colgroup><thead><tr><th>
 						Debilidades
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html
index 41f4bec..3e04e6a 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.2. Instrucciones paso a paso para su instalación</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. Archivos Encriptados 7-Zip" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. Archivos Encriptados 7-Zip" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Instrucciones paso a paso para su utilización" /></head><body class="toc_embeded "
 ><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.8.2. Instrucciones paso a paso para su instalación" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions"><div class="titlepage"><div><div keep-to
 gether.within-column="always"><h3 class="title">3.8.2. Instrucciones paso a paso para su instalación</h3></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.2. Instrucciones paso a paso para su instalación</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. Archivos Encriptados 7-Zip" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. Archivos Encriptados 7-Zip" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Instrucciones paso a paso para su utilización" /></head><body class="toc_embed
 ed "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.8.2. Instrucciones paso a paso para su instalación" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions"><div class="titlepage"><div><div kee
 p-together.within-column="always"><h3 class="title">3.8.2. Instrucciones paso a paso para su instalación</h3></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					Open a Terminal: <code class="code">Click ''Applications'' -&gt; ''System Tools'' -&gt; ''Terminal''</code>
 				</div></li><li class="listitem"><div class="para">
 					Instale 7-Zip con permisos de usuario sudo: <code class="code">sudo yum install p7zip</code>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html
index e7e2378..49dc2d8 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.4. Elementos para prestar atención</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. Archivos Encriptados 7-Zip" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Instrucciones paso a paso para su utilización" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" /></head><body class="toc_embeded "><div id="tocdiv" c
 lass="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.8.4. Elementos para prestar atención" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.8.4. Elem
 entos para prestar atención</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.4. Elementos para prestar atención</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. Archivos Encriptados 7-Zip" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Instrucciones paso a paso para su utilización" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" /></head><body class="toc_embeded "><div id="tocdi
 v" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.8.4. Elementos para prestar atención" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.8.4. 
 Elementos para prestar atención</h3></div></div></div><div class="para">
 			7-Zip no se encuentra instalado por defecto en los sistemas operativos Microsoft Windows o Mac OS X. Si necesita utilizar sus archivos 7-Zip en alguna de estas plataformas, necesitará instalar la versión apropiada de 7-Zip en los equipos correspondientes. Vea la <a href="http://www.7-zip.org/download.html">página de descargas</a>.
 		</div><div class="para">
 			GNOME's File Roller application will recognize your .7z files and attempt to open them, but it will fail with the error "''An error occurred while loading the archive.''" when it attempts to do so. This is because File Roller does not currently support the extraction of encrypted 7-Zip files. A bug report ([http://bugzilla.gnome.org/show_bug.cgi?id=490732 Gnome Bug 490732]) has been submitted.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html
index 5714740..f251752 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.3. Instrucciones paso a paso para su utilización</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. Archivos Encriptados 7-Zip" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Instrucciones paso a paso para su instalación" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Elementos para prestar atención" /></h
 ead><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.8.3. Instrucciones paso a paso para su utilización" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructi
 ons"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.8.3. Instrucciones paso a paso para su utilización</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.3. Instrucciones paso a paso para su utilización</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. Archivos Encriptados 7-Zip" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Instrucciones paso a paso para su instalación" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Elementos para prestar atención" /
 ></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.8.3. Instrucciones paso a paso para su utilización" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instr
 uctions"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.8.3. Instrucciones paso a paso para su utilización</h3></div></div></div><div class="para">
 			By following these instructions you are going to compress and encrypt your "Documents" directory. Your original "Documents" directory will remain unaltered. This technique can be applied to any directory or file you have access to on the filesystem.
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					Open a Terminal:<code class="code">Click ''Applications'' -&gt; ''System Tools'' -&gt; ''Terminal''</code>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html
index 142c15f..b2b626c 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8. Archivos Encriptados 7-Zip</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Enlaces de interés" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Instrucciones paso a paso para su instalación" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfr
 ame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="3.8. Archivos Encriptados 7-Zip" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.8. Ar
 chivos Encriptados 7-Zip</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8. Archivos Encriptados 7-Zip</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Enlaces de interés" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Instrucciones paso a paso para su instalación" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="t
 ocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="3.8. Archivos Encriptados 7-Zip" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.8
 . Archivos Encriptados 7-Zip</h2></div></div></div><div class="para">
 		<a href="http://www.7-zip.org/">7-Zip</a> es una nueva herramienta de compresión multiplataforma que también puede realizar poderosos encriptados (AES-256) para proteger los contenidos de un archivo. Esto es muy útil cuando necesite trasladar datos entre diferentes computadoras que utilicen distintos sistemas operativos, y quiera utilizar para ello una herramienta de encriptado portátil (por ejemplo, Linux en el hogar, Windows en el trabajo).
 	</div><div class="section" title="3.8.1. Instalación de 7-Zip en Fedora" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.8.1. Instalación de 7-Zip en Fedora</h3></div></div></div><div class="para">
 			7-Zip no es un paquete que venga instalado por defecto con Fedora, pero se encuentra disponible para descargarlo desde el repositorio. Una vez instalado, el paquete se irá actualizando cada vez que sea necesario, del mismo modo que el resto del software en su sistema, sin necesitar para ello ningún tipo de atención especial.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html
index 663b1f1..62669de 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.2. Encriptación completa del disco</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="next" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Encriptación basada en archivo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This 
 is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.2. Encriptación completa del disco" id="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.2. Encriptación completa del disco</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.2. Encriptación completa del disco</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="next" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Encriptación basada en archivo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">T
 his is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.2. Encriptación completa del disco" id="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.2. Encriptación completa del disco</h2></div></div></div><div class="para">
 			Full disk or partition encryption is one of the best ways of protecting your data. Not only is each file protected but also the temporary storage that may contain parts of these files is also protected. Full disk encryption will protect all of your files so you don't have to worry about selecting what you want to protect and possibly missing a file.
 		</div><div class="para">
 			Desde la liberación de Fedora 9, ésta y cualquier versión posterior tiene soporte nativo para Encriptado LUKS. LUKS (por las iniciales en inglés de Linux Unified Key Setup-on-disk-format) va a encriptar las particiones de su disco rígido de modo que cuando su computadora se encuentre apagada, sus datos estarán protegidos. Esto también protegerá los datos de su computadora de atacantes que intenten ingresar a su equipo en el modo de usuario único, o que hubieran conseguido el acceso de otra forma.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html
index 56f19ac..c37de8a 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.4. Acerca del encriptado de la clave pública</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Crear una clave GPG mediante la línea de comandos" /><link rel="next" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Capítulo 4. Principios Generales sobre la Seguridad de la Información" />
 </head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.9.4. Acerca del encriptado de la clave pública" id="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption"><div class="titlepage"><di
 v><div keep-together.within-column="always"><h3 class="title">3.9.4. Acerca del encriptado de la clave pública</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.4. Acerca del encriptado de la clave pública</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Crear una clave GPG mediante la línea de comandos" /><link rel="next" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Capítulo 4. Principios Generales sobre la Seguridad de la Información
 " /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.9.4. Acerca del encriptado de la clave pública" id="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption"><div class="titlepage"
 ><div><div keep-together.within-column="always"><h3 class="title">3.9.4. Acerca del encriptado de la clave pública</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					<a href="http://en.wikipedia.org/wiki/Public-key_cryptography">Wikipedia - Public Key Cryptography</a>
 				</div></li><li class="listitem"><div class="para">
 					<a href="http://computer.howstuffworks.com/encryption.htm">HowStuffWorks - Encryption</a>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html
index 3f86a75..139d76a 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.3. Crear una clave GPG mediante la línea de comandos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Crear claves GPG en KDE" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Acerca del encriptado de la clave pública" /></head><body class="toc_embeded ">
 <div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.9.3. Crear una clave GPG mediante la línea de comandos" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE"><div class="titlepage"><div><div keep-together.w
 ithin-column="always"><h3 class="title">3.9.3. Crear una clave GPG mediante la línea de comandos</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.3. Crear una clave GPG mediante la línea de comandos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Crear claves GPG en KDE" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Acerca del encriptado de la clave pública" /></head><body class="toc_embede
 d "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.9.3. Crear una clave GPG mediante la línea de comandos" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE"><div class="titlepage"><div><div keep-togeth
 er.within-column="always"><h3 class="title">3.9.3. Crear una clave GPG mediante la línea de comandos</h3></div></div></div><div class="para">
 			Use el siguiente comando: <code class="code">gpg --gen-key</code>
 		</div><div class="para">
 			El siguiente comando genera un par de claves consistentes en una clave pública y otra privada. El resto de las personas utilizan su clave pública para autenticar y/o decriptar sus comunicaciones. Distribuya su clave pública lo mayor que pueda, especialmente a todos aquellos que quieran recibir comunicaciones auténticas por parte suya, como ser por ejemplo una lista de correo. El proyecto de documentación de Fedora, por ejemplo, le pide a sus participantes que incluyan su llave pública GPG en su correo introductorio.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html
index 9dc0e7a..cf701ca 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.2. Crear claves GPG en KDE</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Crear una clave GPG mediante la línea de comandos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe 
 id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.9.2. Crear claves GPG en KDE" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.9.2. Crear claves GPG en KDE</h3></div></div></div
 ><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.2. Crear claves GPG en KDE</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Crear una clave GPG mediante la línea de comandos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifr
 ame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.9.2. Crear claves GPG en KDE" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.9.2. Crear claves GPG en KDE</h3></div></div><
 /div><div class="para">
 			Start the KGpg program from the main menu by selecting Applications &gt; Utilities &gt; Encryption Tool. If you have never used KGpg before, the program walks you through the process of creating your own GPG keypair. A dialog box appears prompting you to create a new key pair. Enter your name, email address, and an optional comment. You can also choose an expiration time for your key, as well as the key strength (number of bits) and algorithms. The next dialog box prompts you for your passphrase. At this point, your key appears in the main <code class="code">KGpg</code> window.
 		</div><div class="warning"><h2>Advertencia</h2><div class="para">
 				Si se olvida su frase de acceso, la clave no podrá ser utilizada y cualquier dato encriptado por ella será perdido.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG.html
index 870ca24..218298f 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9. Utilizando GNU Privacy Guard (GnuPG)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Elementos para prestar atención" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Crear claves GPG en KDE" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe
 " class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" id="sect-Security_Guide-Encryption-Using_GPG" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.9. Utilizando GN
 U Privacy Guard (GnuPG)</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9. Utilizando GNU Privacy Guard (GnuPG)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Elementos para prestar atención" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Crear claves GPG en KDE" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocf
 rame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="3.9. Utilizando GNU Privacy Guard (GnuPG)" id="sect-Security_Guide-Encryption-Using_GPG" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.9. Utilizand
 o GNU Privacy Guard (GnuPG)</h2></div></div></div><div class="para">
 		GPG is used to identify yourself and authenticate your communications, including those with people you don't know. GPG allows anyone reading a GPG-signed email to verify its authenticity. In other words, GPG allows someone to be reasonably certain that communications signed by you actually are from you. GPG is useful because it helps prevent third parties from altering code or intercepting conversations and altering the message.
 	</div><div class="section" title="3.9.1. Crear claves GPG en GNOME" id="sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.9.1. Crear claves GPG en GNOME</h3></div></div></div><div class="para">
 			Install the Seahorse utility, which makes GPG key management easier. From the main menu, select <code class="code">System &gt; Administration &gt; Add/Remove Software</code> and wait for PackageKit to start. Enter <code class="code">Seahorse</code> into the text box and select the Find. Select the checkbox next to the ''seahorse'' package and select ''Apply'' to add the software. You can also install <code class="code">Seahorse</code> at the command line with the command <code class="code">su -c "yum install seahorse"</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html
index bb26565..1a503d7 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.5. Anticipando sus necesidades futuras</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD el escáner" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Atacantes y vulnerabilidades" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="toc
 frame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.3.5. Anticipando sus necesidades futuras" id="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.5. Anticipando sus necesidades fu
 turas</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.5. Anticipando sus necesidades futuras</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD el escáner" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Atacantes y vulnerabilidades" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id=
 "tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.3.5. Anticipando sus necesidades futuras" id="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.5. Anticipando sus necesidade
 s futuras</h4></div></div></div><div class="para">
 				De acuerdo a sus intenciones y a sus herramientas, existen muchas otras herramientas disponibles. Estas son herramientas para redes inalámbricas, redes Novell, sistemas Windows, sistemas Linux, y más. Otro componente fundamental a la hora de realizar evaluaciones puede incluir la revisión de la seguridad física, visualización personal o evaluaciones de redes de tipo voz/PBX. Conceptos novedosos como <em class="firstterm">caminata de guerra</em>, que implica analizar el perímetro de la estructura física de su empresa en busca de debilidades en la red inalámbrica, son algunos de los conceptos recientes que podría investigar y, de ser necesario, incorporarlos a sus evaluaciones. La imaginación y la exposición son los únicos límites a la hora de planificar y llevar a cabo evaluaciones de seguridad.
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Anterior</strong>1.2.3.4. VLAD el escáner</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Siguiente</strong>1.3. Atacantes y vulnerabilidades</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nessus.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nessus.html
index 2e2e2ff..3c53bcc 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nessus.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nessus.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.2. Nessus</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../.
 ./toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.3.2. Nessus" id="sect-Security_Guide-Evaluating_the_Tools-Nessus"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.2. Nessus</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.2. Nessus</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../
 ../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.3.2. Nessus" id="sect-Security_Guide-Evaluating_the_Tools-Nessus"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.2. Nessus</h4></div></div></div><div class="para">
 				Nessus es un examinador de seguridad para cualquier tipo de servicios. La arquitectura de tipo complementos de Nessus permite a los usuarios personalizarlo de acuerdo a los requerimientos de sus sistemas o redes. Como cualquier otro examinador, la eficiencia de Nessus es directamente proporcional a la base de datos de la que depende. Afortunadamente, Nessus es actualizado periódicamente y entre sus recursos se encuentran el de ofrecer informes completos, análisis de equipos, y búsqueda de debilidades en tiempo real. Recuerde que siempre pueden existir resultados falsos, aún en herramientas tan poderosas y tan frecuentemente actualizadas como Nessus.
 			</div><div class="note"><h2>Nota</h2><div class="para">
 					Tanto el servidor como el cliente Nessus se encuentran disposnibles en los repositorios de Fedora, pero para poder utilizarlos es necesario suscribirse. Se ha incluido en este documento como una referencia para aquellos usuarios que podrían estar interesados en utilizar esta conocida herramienta.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nikto.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nikto.html
index debf149..55dd783 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nikto.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nikto.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.3. Nikto</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD el escáner" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This
  is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.3.3. Nikto" id="sect-Security_Guide-Evaluating_the_Tools-Nikto"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.3. Nikto</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.3. Nikto</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD el escáner" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">
 This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.3.3. Nikto" id="sect-Security_Guide-Evaluating_the_Tools-Nikto"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.3. Nikto</h4></div></div></div><div class="para">
 				Nikto es un excelente examinador de programas de interfaz común de puerta de enlace (CGI, por las iniciales en inglés de Common Gateway Interface). Nikto no sólo verifica debilidades CGI, sino que lo hace de una forma evasiva, de modo de poder evitar sistemas de detección de intrusiones. Se ofrece con información detallada que debería ser cuidadosamente leída antes de ejecutar el programa. Si usted posee servidores Web ofreciendo programas CGI, Nikto puede ser una herramienta excelente para verificar la seguridad de estos servidores.
 			</div><div class="para">
 				Más información sobre Nikto se puede encontrar en la siguiente URL:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html
index 0c275b2..cee615b 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.4. VLAD el escáner</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticipando sus necesidades futuras" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" c
 lass="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.3.4. VLAD el escáner" id="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.4. VLAD el escáner</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.4. VLAD el escáner</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticipando sus necesidades futuras" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfram
 e" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.3.4. VLAD el escáner" id="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.4. VLAD el escáner</h4></div></div></div><div class="para"
 >
 				VLAD es un examinador de debilidades desarrollado por el equipo <acronym class="acronym">RAZOR</acronym> de Bindview, Inc., que verifica en la lista SANS de los diez problemas de seguridad más comunes (problemas SNMP, problemas por compartir archivos, etc.). Si bien no es tan completo como Nessus, vale la pena investigar VLAD.
 			</div><div class="note"><h2>Nota</h2><div class="para">
 					VLAD no se incluye con Fedora y no está soportado. Se ha incluido en este documento como una referencia para aquellos usuarios que podrían estar interesados en utilizar esta conocida aplicación.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html
index d7ae13a..22199af 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5.3. IPTables y las ZDM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. Reglas FORWARD y NAT" /><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Preruteo" /><link rel="next" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Software malicioso y suplantación de direcciones IP" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocf
 rame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.5.3. IPTables y las ZDM" id="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.5.3. IPTables y las ZDM</h4></div></div></div>
 <div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5.3. IPTables y las ZDM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. Reglas FORWARD y NAT" /><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Preruteo" /><link rel="next" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Software malicioso y suplantación de direcciones IP" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="
 tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.5.3. IPTables y las ZDM" id="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.5.3. IPTables y las ZDM</h4></div></div></
 div><div class="para">
 				Puede crear reglas de <code class="command">iptables</code> para enrutar tráfico a ciertos equipos, como por ejemplo un servidor HTTP o FTP dedicado, en una <em class="firstterm">zona desmilitarizada</em> (<acronym class="acronym">DMZ</acronym>, por las iniciales en inglés de DeMilitarized Zone). Un <acronym class="acronym">DMZ</acronym> es una subred local especial dedicada a proveer servicios en un transporte público, como lo es Internet.
 			</div><div class="para">
 				Por ejemplo, para establecer una regla para enrutar peticiones HTTP entrantes a un servidor dedicado HTTP en 10-0-4-2 (fuera del rango 192.168.1.0/24 de la LAN), NAT utiliza la tabla <code class="computeroutput">PREROUTING</code> para reenviar los paquetes a la dirección apropiada:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html
index cde7f5b..d147db6 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5.2. Preruteo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. Reglas FORWARD y NAT" /><link rel="prev" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. Reglas FORWARD y NAT" /><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. IPTables y las ZDM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">Th
 is is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.5.2. Preruteo" id="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.5.2. Preruteo</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5.2. Preruteo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. Reglas FORWARD y NAT" /><link rel="prev" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. Reglas FORWARD y NAT" /><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. IPTables y las ZDM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html
 ">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.5.2. Preruteo" id="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.5.2. Preruteo</h4></div></div></div><div class="para">
 				Si usted posee un servidor en su red interna que quiere que esté disponible desde el exterior, puede utilizar <code class="option">-j DNAT</code>, objetivo de la cadena PREROUTING de NAT para especificar una IP de destino, y un puerto donde los paquetes recibidos que pidan una conexión a su servicio interno, puedan ser reenviados.
 			</div><div class="para">
 				Por ejemplo, si quiere reenviar pedidos HTTP entrantes a su servidor HTTP Apache dedicado en 172.31.0.23, use el siguiente comando:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Additional_Resources.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Additional_Resources.html
index 5be5c0c..5019957 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Additional_Resources.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Additional_Resources.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9. Recursos adicionales</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Sitios web útiles de cortafuego" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade 
 your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.9. Recursos adicionales" id="sect-Security_Guide-Firewalls-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.9. Recursos adicionales</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9. Recursos adicionales</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Sitios web útiles de cortafuego" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgr
 ade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.9. Recursos adicionales" id="sect-Security_Guide-Firewalls-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.9. Recursos adicionales</h3></div></div></div><div class="para">
 			Hay varios aspectos de cortafuegos y del subsistema Netfilter de Linux que no pueden ser cubiertos en este capítulo. Para más información consulte las referencias que ofrecemos a continuación.
 		</div><div class="section" title="2.8.9.1. Documentación instalada del cortafuego" id="sect-Security_Guide-Additional_Resources-Installed_Firewall_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.9.1. Documentación instalada del cortafuego</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Refer to <a class="xref" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables">Sección 2.9, “IPTables”</a> for more detailed information on the <code class="command">iptables</code> command, including definitions for many command options.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html
index 289c366..7a214d0 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2. Configuración básica de un cortafuego</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Habilitando y deshabilitando el cortafuego" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../
 toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2. Configuración básica de un cortafuego" id="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.2. Configuración básica de un cortafuego</h3></div></div></div><div class
 ="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2. Configuración básica de un cortafuego</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Habilitando y deshabilitando el cortafuego" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../..
 /../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.2. Configuración básica de un cortafuego" id="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.2. Configuración básica de un cortafuego</h3></div></div></div><div c
 lass="para">
 			Del mismo modo que el extintor de incendios en un edificio intenta prevenir que se propague un incendio, en una computadora, un cortafuegos intenta prevenir que algún tipo de software malicioso se propague en su equipo. También ayuda a prevenir que usuarios no autorizados accedan a su computadora.
 		</div><div class="para">
 			En una instalación por defecto de Fedora existe un cortafuegos entre su computadora o red, y cualquier otra red considerada como no segura, como por ejemplo lo es Internet. Determina qué servicios en su computadora pueden ser accedidos por usuarios remotos. Un cortafuegos correctamente configurado puede incrementar enormemente la seguridad de su sistema. Se recomienda que configure un cortafuegos para cualquier sistema Fedora que tenga una conexión a Internet.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html
index 399972a..6b10cb7 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.4. Filtrado común de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Guardando y restaurando las reglas de IPTables" /><link rel="next" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. Reglas FORWARD y NAT" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src=".
 ./../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.4. Filtrado común de IPTables" id="sect-Security_Guide-Firewalls-Common_IPTables_Filtering"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.4. Filtrado común de IPTables</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.4. Filtrado común de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Guardando y restaurando las reglas de IPTables" /><link rel="next" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. Reglas FORWARD y NAT" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" sr
 c="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.4. Filtrado común de IPTables" id="sect-Security_Guide-Firewalls-Common_IPTables_Filtering"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.4. Filtrado común de IPTables</h3></div></div></div><div class="pa
 ra">
 			La prevención del acceso a la red de atacantes remotos es uno de los aspectos más importantes de la seguridad de la red. La integridad de la LAN debe protegerse de los usuarios remotos maliciosos a través del uso de las reglas estrictas de cortafuego.
 		</div><div class="para">
 			Sin embargo, con una política por defecto de bloquear todos los paquetes entrantes, salientes y reenviados, es imposible que los usuarios del cortafuego/puerta de enlace y los usuarios internos de la LAN puedan comunicarse entre ellos, o con recursos externos.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html
index aaf1b8d..14ce0b9 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5. Reglas FORWARD y NAT</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Filtrado común de IPTables" /><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Preruteo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it u
 pgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.5. Reglas FORWARD y NAT" id="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.5. Reglas <code class="computeroutput">FORWARD</code> y <acronym class="acronym">NAT</acronym></h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5. Reglas FORWARD y NAT</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Filtrado común de IPTables" /><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Preruteo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view 
 it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.5. Reglas FORWARD y NAT" id="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.5. Reglas <code class="computeroutput">FORWARD</code> y <acronym class="acronym">NAT</acronym></h3></div></div></div><div class="para">
 			La mayoría de los ISPs proveen sólo un número limitado de direcciones IP disponibles públicamente para sus clientes.
 		</div><div class="para">
 			Los administradores deben, por lo tanto, encontrar formas alternativas de compartir el acceso a los servicios de Internet, sin darle por ello una dirección IP pública a cada nodo de la LAN. Utilizar direcciones IP privadas es la manera más común de permitirle a todos los nodos de una LAN que tengan un acceso correcto, tanto interno como externo, a los servicios de red.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html
index 8b71203..e199670 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.7. IPTables y el seguimiento de la conexión</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Software malicioso y suplantación de direcciones IP" /><link rel="next" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../t
 oc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.7. IPTables y el seguimiento de la conexión" id="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.7. IPTables y el seguimiento de la conexión</h3></div></div></div><div clas
 s="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.7. IPTables y el seguimiento de la conexión</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Software malicioso y suplantación de direcciones IP" /><link rel="next" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../
 ../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.7. IPTables y el seguimiento de la conexión" id="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.7. IPTables y el seguimiento de la conexión</h3></div></div></div><div 
 class="para">
 			Puede inspeccionar y restringir conexiones a servicios basados en sus <em class="firstterm">estados de conexión</em>. Un módulo dentro de <code class="command">iptables</code> utiliza un método denominado <em class="firstterm">rastreo de conexión</em> para almacenar datos acerca de las conexiones recibidas. Puede permitir o negar acceso basándose en los siguientes estados de conexión:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="option">NEW</code> — Un paquete que pide una nueva conexión, tal como un pedido HTTP.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPv6.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPv6.html
index 83b5a21..0c8e6df 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPv6.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPv6.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.8. IPv6</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables y el seguimiento de la conexión" /><link rel="next" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Recursos adicionales" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe,
  to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.8. IPv6" id="sect-Security_Guide-Firewalls-IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.8. IPv6</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.8. IPv6</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables y el seguimiento de la conexión" /><link rel="next" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Recursos adicionales" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an ifr
 ame, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.8. IPv6" id="sect-Security_Guide-Firewalls-IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.8. IPv6</h3></div></div></div><div class="para">
 			La introducción de la siguiente generación del Protocolo de Internet, llamado IPv6, expande más allá de los límites de las direcciones de 32-bit de IPv4 (o IP). IPv6 soporta direcciones de 128-bit, y las redes transportadoras que pueden soportar IPv6 son por lo tanto capaces de manejar un número más grande de direcciones ruteables que el IPv4.
 		</div><div class="para">
 			Fedora soporta reglas de cortafuego para IPv6 usando el subsistema Netfilter 6 y el comando <code class="command">ip6tables</code>. En Fedora 11, los servicios de IPv4 e IPv6 están habilitados por defecto.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html
index 25cfea3..1394b18 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.6. Software malicioso y suplantación de direcciones IP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. IPTables y las ZDM" /><link rel="next" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables y el seguimiento de la conexión" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" 
 class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.6. Software malicioso y suplantación de direcciones IP" id="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.6. Softwar
 e malicioso y suplantación de direcciones IP </h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.6. Software malicioso y suplantación de direcciones IP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. IPTables y las ZDM" /><link rel="next" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables y el seguimiento de la conexión" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfra
 me" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.6. Software malicioso y suplantación de direcciones IP" id="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.6. Sof
 tware malicioso y suplantación de direcciones IP </h3></div></div></div><div class="para">
 			Reglas más elaboradas pueden ser creadas para que controlen el acceso a subredes específicas, o incluso para nodos específicos, dentro de la LAN. Puede también restringir ciertas aplicaciones o programas de carácter dudoso como troyanos, gusanos, y demás virus cliente/servidor, y evitar que entren en contacto con sus servidores.
 		</div><div class="para">
 			Por ejemplo, algunos troyanos examinan redes para ver los servicios en los puertos 31337 a 31340 (llamados los puertos <span class="emphasis"><em>elite</em></span> en la terminología de craqueo).
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Using_IPTables.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Using_IPTables.html
index ee206d7..a2a55f2 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Using_IPTables.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Using_IPTables.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3. Uso de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Activando el servicio IPTables" /><link rel="next" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Políticas básicas del cortafuego" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" s
 rc="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.3. Uso de IPTables" id="sect-Security_Guide-Firewalls-Using_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.3. Uso de IPTables</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3. Uso de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Activando el servicio IPTables" /><link rel="next" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Políticas básicas del cortafuego" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="to
 c" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.3. Uso de IPTables" id="sect-Security_Guide-Firewalls-Using_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.3. Uso de IPTables</h3></div></div></div><div class="para">
 			El primer paso en el uso de <code class="command">iptables</code> es iniciar el servicio <code class="command">iptables</code>. Use el siguiente comando para iniciar el servicio <code class="command">iptables</code>:
 		</div><pre class="screen">[root at miServidor ~] # service iptables start
 </pre><div class="note"><h2>Nota</h2><div class="para">
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls.html
index 24c5655..1040153 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8. Cortafuegos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html" title="2.7.8. Iniciar y detener una conexión IPsec" /><link rel="next" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /></head><body class="toc_embeded "><div id="tocdiv" class="t
 oc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.8. Cortafuegos" id="sect-Security_Guide-Firewalls" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.8. Cortafuegos<
 /h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8. Cortafuegos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html" title="2.7.8. Iniciar y detener una conexión IPsec" /><link rel="next" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego" /></head><body class="toc_embeded "><div id="tocdiv" clas
 s="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.8. Cortafuegos" id="sect-Security_Guide-Firewalls" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.8. Cortafue
 gos</h2></div></div></div><div class="para">
 		La seguridad de la información es comúnmente entendida como un proceso, y no como un producto. Sin embargo, generalmente las implementaciones estándar de seguridad utilizan alguna forma de mecanismo específico para controlar los accesos privilegiados y restringir los recursos de red a usuarios que estén debidamente autorizados para ello, y al mismo tiempo poder identificarlos y rastrearlos. Fedora incluye diferentes herramientas para ayudar a los administradores y a los ingenieros en seguridad, con los diferentes problemas que puedan surgir al controlar los accesos jerarquizados a la red.
 	</div><div class="para">
 		Los cortafuegos son uno de los componentes fundamentales para la implementación de la seguridad en una red. Diversos proveedores ofrecen herramientas para cortafuegos para todos los niveles del mercado: desde usuarios hogareños protegiendo los datos de su PC, hasta herramientas para centros de datos que permitan proteger los datos vitales de una empresa. Los cortafuegos pueden ser herramientas para un sólo equipo físico, como las aplicaciones de cortafuego que ofrecen Cisco, Nokia y Sonicwall. Proveedores como Checkpoint, McAfee y Symantec también han desarrollado herramientas de cortafuegos de código propietario, tanto para el hogar como para los segmentos comerciales del mercado.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Additional_Resources.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Additional_Resources.html
index 13d30d6..8142cf3 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Additional_Resources.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Additional_Resources.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.7. Recursos adicionales</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.6. IPTables e IPv6" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.7.2. Sitios web útiles sobre IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe
 , to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.7. Recursos adicionales" id="sect-Security_Guide-IPTables-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.7. Recursos adicionales</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.7. Recursos adicionales</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.6. IPTables e IPv6" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.7.2. Sitios web útiles sobre IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an if
 rame, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.7. Recursos adicionales" id="sect-Security_Guide-IPTables-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.7. Recursos adicionales</h3></div></div></div><div class="para">
 			Consulte las siguientes referencias para obtener información adicional sobre el filtrado de paquetes con <code class="command">iptables</code>.
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<a class="xref" href="sect-Security_Guide-Firewalls.html" title="2.8. Cortafuegos">Sección 2.8, “Cortafuegos”</a> — Contains a chapter about the role of firewalls within an overall security strategy as well as strategies for constructing firewall rules.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Command_Options_for_IPTables.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Command_Options_for_IPTables.html
index 031114a..48457c9 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Command_Options_for_IPTables.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Command_Options_for_IPTables.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3. Opciones de la línea de comandos de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html" title="2.9.2. Diferencias entre IPTables e IPChains" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.3.2. Opciones de comandos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" 
 class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3. Opciones de la línea de comandos de IPTables" id="sect-Security_Guide-IPTables-Command_Options_for_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.3. Opciones de la lÃ
 ­nea de comandos de IPTables</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3. Opciones de la línea de comandos de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html" title="2.9.2. Diferencias entre IPTables e IPChains" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.3.2. Opciones de comandos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfra
 me" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3. Opciones de la línea de comandos de IPTables" id="sect-Security_Guide-IPTables-Command_Options_for_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.3. Opciones de l
 a línea de comandos de IPTables</h3></div></div></div><div class="para">
 			Las reglas para el filtrado de paquetes se crean usando el comando <code class="command">iptables</code>. Los aspectos siguientes del paquete son los más usados como criterios:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<span class="emphasis"><em>Tipo de Paquete</em></span> — Especifica el tipo de paquete que filtra el comando.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html
index ac6efa1..7c39e70 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.2. Diferencias entre IPTables e IPChains</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="next" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view
  it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.2. Diferencias entre IPTables e IPChains" id="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.2. Diferencias entre IPTables e IPChains</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.2. Diferencias entre IPTables e IPChains</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="next" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Opciones de la línea de comandos de IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to 
 view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.2. Diferencias entre IPTables e IPChains" id="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.2. Diferencias entre IPTables e IPChains</h3></div></div></div><div class="para">
 			Tanto <code class="command">ipchains</code> como <code class="command">iptables</code> utilizan cadenas de reglas que operan dentro del kernel Linux, para filtrar paquetes basados en su correspondencia con una regla o un conjunto de reglas determinado. Sin embargo, <code class="command">iptables</code> ofrece una forma más amplia de filtrado de paquetes, dándole al administrador un control superior sobre su sistema, sin por ello tener que crear en él complejidades innecesarias.
 		</div><div class="para">
 			Debe estar atento a las siguientes diferencias significativas entre <code class="command">ipchains</code> e <code class="command">iptables</code>:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_Control_Scripts.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_Control_Scripts.html
index f5604f9..0bfeec2 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_Control_Scripts.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_Control_Scripts.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.5. Programas de control de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.4. Guardando las reglas de IPTalbes" /><link rel="next" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.6. IPTables e IPv6" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to vi
 ew it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.5. Programas de control de IPTables" id="sect-Security_Guide-IPTables-IPTables_Control_Scripts"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.5. Programas de control de IPTables</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.5. Programas de control de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.4. Guardando las reglas de IPTalbes" /><link rel="next" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.6. IPTables e IPv6" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, t
 o view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.5. Programas de control de IPTables" id="sect-Security_Guide-IPTables-IPTables_Control_Scripts"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.5. Programas de control de IPTables</h3></div></div></div><div class="para">
 			Hay dos métodos básicos de controlar <code class="command">iptables</code> en Fedora:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<span class="application"><strong>Firewall Configuration Tool</strong></span> (<code class="command">system-config-securitylevel</code>) — A graphical interface for creating, activating, and saving basic firewall rules. Refer to <a class="xref" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Configuración básica de un cortafuego">Sección 2.8.2, “Configuración básica de un cortafuego”</a> for more information.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_and_IPv6.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_and_IPv6.html
index 8ab8a36..f840f63 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_and_IPv6.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_and_IPv6.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.6. IPTables e IPv6</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.5. Programas de control de IPTables" /><link rel="next" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Recursos adicionales" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it 
 upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.6. IPTables e IPv6" id="sect-Security_Guide-IPTables-IPTables_and_IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.6. IPTables e IPv6</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.6. IPTables e IPv6</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.5. Programas de control de IPTables" /><link rel="next" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Recursos adicionales" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view
  it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.6. IPTables e IPv6" id="sect-Security_Guide-IPTables-IPTables_and_IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.6. IPTables e IPv6</h3></div></div></div><div class="para">
 			Si se instala el paquete <code class="filename">iptables-ipv6</code>, netfilter en Fedora puede filtrar la siguiente generación del protocolo de Internet IPv6. El comando usado para manipular el netfilter de IPv6 es <code class="command">ip6tables</code>.
 		</div><div class="para">
 			La mayoría de las directivas para este comando son idénticas a aquellas utilizadas para <code class="command">iptables</code>, excepto que la tabla <code class="command">nat</code> no es aún soportada. Esto significa que aún no es posible realizar tareas de traslados sobre direcciones de redes IPv6, como ser, por ejemplo, enmascaramiento y reenvío de puertos.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Saving_IPTables_Rules.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Saving_IPTables_Rules.html
index 7f7fc9a..ec6b8dd 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Saving_IPTables_Rules.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Saving_IPTables_Rules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.4. Guardando las reglas de IPTalbes</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.3.6. Opciones de listado" /><link rel="next" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.5. Programas de control de IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.htm
 l">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.4. Guardando las reglas de IPTalbes" id="sect-Security_Guide-IPTables-Saving_IPTables_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.4. Guardando las reglas de IPTalbes</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.4. Guardando las reglas de IPTalbes</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.3.6. Opciones de listado" /><link rel="next" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.5. Programas de control de IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc
 .html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.4. Guardando las reglas de IPTalbes" id="sect-Security_Guide-IPTables-Saving_IPTables_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.4. Guardando las reglas de IPTalbes</h3></div></div></div><div class="para">
 			Las reglas creadas con el comando <code class="command">iptables</code> son almacenadas en la memoria. Si el sistema es reiniciado antes de guardar el conjunto de reglas de <code class="command">iptables</code>, estas reglas se perderán. Para que las reglas de netfilter sigan vigentes luego de reiniciar el sistema, necesitan ser guardadas. Para salvar reglas de netfilter, ingrese el siguiente comando como usuario root:
 		</div><pre class="screen"><code class="command"> /sbin/service iptables save </code>
 </pre><div class="para">
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables.html
index 9bfeb65..d612130 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9. IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Documentación relacionada" /><link rel="next" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html" title="2.9.2. Diferencias entre IPTables e IPChains" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class
 ="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.9. IPTables" id="sect-Security_Guide-IPTables" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.9. IPTables</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9. IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Documentación relacionada" /><link rel="next" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html" title="2.9.2. Diferencias entre IPTables e IPChains" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" c
 lass="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.9. IPTables" id="sect-Security_Guide-IPTables" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.9. IPTables</h2></div></div></div><div class="para">
 		Con Fedora están incluidas herramientas avanzadas para el <em class="firstterm">filtrado de paquetes</em> — el proceso dentro de kernel que permite controlar a los paquetes de red mientras están ingresando a nuestro entorno, mientras lo están recorriendo y cuando lo abandonan. Las versiones del kernel anteriores a la 2.4, dependían de <code class="command">ipchains</code> para el filtrado de paquetes, y utilizaban listas de reglas aplicadas a los paquetes en cada paso del proceso de filtrado. El kernel 2.4 introdujo la utilización de <code class="command">iptables</code> (también llamado <em class="firstterm">netfilter</em>), que si bien es similar a <code class="command">ipchains</code>, expande enormemente el rango y la posibilidad de control disponible para filtrar los paquetes de red.
 	</div><div class="para">
 		El siguiente capítulo se dedica a los conceptos básicos del filtrado de paquetes, establece las diferencias entre <code class="command">ipchains</code> e <code class="command">iptables</code>, explica las diferentes opciones disponibles con los comandos de <code class="command">iptables</code>, y explica como las reglas de filtrado pueden ser preservadas entre los reinicios del sistema.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html
index 7ccce7e..e383f0b 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.4. Módulos adicionales para opciones de coincidencia</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. Opciones de coincidencia de IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.3.4.3. Protocolo ICMP" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.3.5. Opciones de destino" /></head><body class="toc_embeded "><d
 iv id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.4.4. Módulos adicionales para opciones de coincidencia" id="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules"><div class="titlepage"><div><div keep-together.withi
 n-column="always"><h5 class="title">2.9.3.4.4. Módulos adicionales para opciones de coincidencia</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.4. Módulos adicionales para opciones de coincidencia</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. Opciones de coincidencia de IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.3.4.3. Protocolo ICMP" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.3.5. Opciones de destino" /></head><body class="toc_embeded 
 "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.4.4. Módulos adicionales para opciones de coincidencia" id="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules"><div class="titlepage"><div><div keep-together.w
 ithin-column="always"><h5 class="title">2.9.3.4.4. Módulos adicionales para opciones de coincidencia</h5></div></div></div><div class="para">
 					Opciones de coincidencias adicionales están disponibles a través de los módulos cargados por el comando <code class="command">iptables</code>.
 				</div><div class="para">
 					To use a match option module, load the module by name using the <code class="option">-m <em class="replaceable"><code>&lt;module-name&gt;</code></em></code>, where <em class="replaceable"><code>&lt;module-name&gt;</code></em> is the name of the module.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html
index e6eb7c6..d3402a5 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.3. Protocolo ICMP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. Opciones de coincidencia de IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.3.4.2. Protocolo UDP" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.3.4.4. Módulos adicionales para opciones de coincidencia" /></head><body class="toc_embede
 d "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.4.3. Protocolo ICMP" id="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.
 9.3.4.3. Protocolo ICMP</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.3. Protocolo ICMP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. Opciones de coincidencia de IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.3.4.2. Protocolo UDP" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.3.4.4. Módulos adicionales para opciones de coincidencia" /></head><body class="toc_em
 beded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.4.3. Protocolo ICMP" id="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title
 ">2.9.3.4.3. Protocolo ICMP</h5></div></div></div><div class="para">
 					Las siguientes opciones de coincidencias están disponibles en el Protocolo de Mensajes de Control de Internet (ICMP) (<code class="option">-p icmp</code>):
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="option">--icmp-type</code> — Establece el nombre y número del tipo de ICMP a corresponderse con la regla. Puede obtenerse una lista de nombres ICMP válidos al ingresar el comando <code class="command">iptables -p icmp -h</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html
index b3d9932..27e0466 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.2. Protocolo UDP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. Opciones de coincidencia de IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. Opciones de coincidencia de IPTables" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.3.4.3. Protocolo ICMP" /></head><body class="toc_embeded "><div id="tocdi
 v" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.4.2. Protocolo UDP" id="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.9.3.4.2. Protocolo UDP
 </h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.2. Protocolo UDP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. Opciones de coincidencia de IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. Opciones de coincidencia de IPTables" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.3.4.3. Protocolo ICMP" /></head><body class="toc_embeded "><div id="t
 ocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.9.3.4.2. Protocolo UDP" id="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.9.3.4.2. Protocolo
  UDP</h5></div></div></div><div class="para">
 					Estas opciones de coincidencias están disponibles para el protocolo UDP (<code class="option">-p udp</code>):
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="option">--dport</code> — Especifica el puerto de destino del paquete UDP, utilizando el nombre del servicio, el número de puerto, o rango de números de puerto. La opción de correspondencia <code class="option">--destination-port</code> es equivalente.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html
index e661d0e..e60fe33 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.6.2. Configuración manual de una conexión IPsec de tipo equipo-a-equipo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. Configuración de IPsec equipo-a-equipo" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. Configuración de IPsec equipo-a-equipo" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Net
 work_Configuration.html" title="2.7.7. Configuración IPsec red-a-red" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.6.2. Configuración manual de u
 na conexión IPsec de tipo equipo-a-equipo" id="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.7.6.2. Configuración manual de una conexión <abbr class="abbrev">IPsec</abbr> de tipo equipo-a-equipo</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.6.2. Configuración manual de una conexión IPsec de tipo equipo-a-equipo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. Configuración de IPsec equipo-a-equipo" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. Configuración de IPsec equipo-a-equipo" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to
 _Network_Configuration.html" title="2.7.7. Configuración IPsec red-a-red" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.6.2. Configuración manual 
 de una conexión IPsec de tipo equipo-a-equipo" id="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.7.6.2. Configuración manual de una conexión <abbr class="abbrev">IPsec</abbr> de tipo equipo-a-equipo</h4></div></div></div><div class="para">
 				El primer paso para crear una conexión es obtener información tanto del sistema como de la red para cada estación de trabajo. Para una conexión de tipo equipo-a-equipo, se necesita lo siguiente:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						La dirección IP de cada equipo
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html
index 25fa365..d06d1ab 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.7.2. Configuración manual de una conexión IPsec de tipo red-a-red.</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. Configuración IPsec red-a-red" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. Configuración IPsec red-a-red" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_
 Connection.html" title="2.7.8. Iniciar y detener una conexión IPsec" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.7.2. Configuración man
 ual de una conexión IPsec de tipo red-a-red." id="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.7.7.2. Configuración manual de una conexión <abbr class="abbrev">IPsec</abbr> de tipo red-a-red.</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.7.2. Configuración manual de una conexión IPsec de tipo red-a-red.</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. Configuración IPsec red-a-red" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. Configuración IPsec red-a-red" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IP
 sec_Connection.html" title="2.7.8. Iniciar y detener una conexión IPsec" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.7.2. Configuración
  manual de una conexión IPsec de tipo red-a-red." id="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.7.7.2. Configuración manual de una conexión <abbr class="abbrev">IPsec</abbr> de tipo red-a-red.</h4></div></div></div><div class="para">
 				Suponga que <acronym class="acronym">LAN</acronym> A (lana.ejemplo.com) y <acronym class="acronym">LAN</acronym> B (lanb.ejemplo.com) quieren conectarse entre ellas mediante un túnel <abbr class="abbrev">IPsec</abbr>. La dirección de red para <acronym class="acronym">LAN</acronym> A está en el rango 192.168.1.0/24. mientras qye <acronym class="acronym">LAN</acronym> B utiliza el rango 192.168.2.0/24. La dirección IP de la puerta de enlace es 192.1686.1.254 para <acronym class="acronym">LAN</acronym> A y 192.168.2.254 para <acronym class="acronym">LAN</acronym> B. Los enrutadores <abbr class="abbrev">IPsec</abbr> están separados de cada puerta de enlace <acronym class="acronym">LAN</acronym> y utilizan dos dispositivos de red: eth0 está asignado a una dirección IP estática accesible desde el exterior que tiene acceso a Internet, mientras eth1 actúa como un punto de enrutamiento para procesar y transmitir los paquetes <acronym class="acronym">LAN</acronym> de un n
 odo de red a otro.
 			</div><div class="para">
 				La conexión <abbr class="abbrev">IPsec</abbr> entre cada red utiliza una clave pre-compartida con el valor de <code class="computeroutput">r3dh4tl1nux</code>, y los administradores de A y B están de acuerdo en permitir que <code class="command">racoon</code> genere automáticamente y comparta una clave de autenticación entre cada enrutador <abbr class="abbrev">IPsec</abbr>. El administrador de <acronym class="acronym">LAN</acronym> A decide identificar a la conexión <abbr class="abbrev">IPsec</abbr> como <code class="computeroutput">ipsec0</code>, mientras que el administrador de <acronym class="acronym">LAN</acronym> B decide identificarla como <code class="computeroutput">ipsec1</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Additional_Resources.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Additional_Resources.html
index a11f26b..f1934a2 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Additional_Resources.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Additional_Resources.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.10. Recursos adicionales</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Configurando la autenticación cruzada de reinados" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Páginas web útiles sobre Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe
 " class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.10. Recursos adicionales" id="sect-Security_Guide-Kerberos-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.10. Recursos adicionales</h3></div></div></div><div c
 lass="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.10. Recursos adicionales</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Configurando la autenticación cruzada de reinados" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Páginas web útiles sobre Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocf
 rame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.10. Recursos adicionales" id="sect-Security_Guide-Kerberos-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.10. Recursos adicionales</h3></div></div></div><d
 iv class="para">
 			Para más información sobre Kerberos, consulte las fuentes que indicamos a continuación.
 		</div><div class="section" title="2.6.10.1. Documentación Instalada de Kerberos" id="sect-Security_Guide-Additional_Resources-Installed_Kerberos_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.6.10.1. Documentación Instalada de Kerberos</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						The <em class="citetitle">Kerberos V5 Installation Guide</em> and the <em class="citetitle">Kerberos V5 System Administrator's Guide</em> in PostScript and HTML formats. These can be found in the <code class="filename">/usr/share/doc/krb5-server-<em class="replaceable"><code>&lt;version-number&gt;</code></em>/</code> directory (where <em class="replaceable"><code>&lt;version-number&gt;</code></em> is the version number of the <code class="command">krb5-server</code> package installed on your system).
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html
index b168aba..4fda783 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.6. Configuración de un Cliente Kerberos 5</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Configurando un servidor Kerberos 5" /><link rel="next" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Mapeo dominio-a-reinado" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../
 toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.6. Configuración de un Cliente Kerberos 5" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.6. Configuración de un Cliente Kerberos 5</h3></div></div></div><div clas
 s="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.6. Configuración de un Cliente Kerberos 5</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Configurando un servidor Kerberos 5" /><link rel="next" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Mapeo dominio-a-reinado" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../..
 /../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.6. Configuración de un Cliente Kerberos 5" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.6. Configuración de un Cliente Kerberos 5</h3></div></div></div><div 
 class="para">
 			Configurar un cliente de Kerberos 5 es menos complicado que configurar un servidor. Como mínimo, instale los paquetes del cliente y otórguele a cada cliente un archivo de configuración <code class="filename">krb5.conf</code> válido. Mientras que <code class="command">ssh</code> y <code class="command">slogin</code> son los métodos preferidos para loguearse remotamente en sistemas cliente, las versiones Kerberizadas de <code class="command">rsh</code> y <code class="command">rlogin</code> siguen estando disponibles, aunque para habilitarlas es necesario realizar algunos cambios adicionales en la configuración.
 		</div><div class="procedure"><ol class="1"><li class="step" title="Paso 1"><div class="para">
 					Be sure that time synchronization is in place between the Kerberos client and the KDC. Refer to <a class="xref" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Configurando un servidor Kerberos 5">Sección 2.6.5, “Configurando un servidor Kerberos 5”</a> for more information. In addition, verify that DNS is working properly on the Kerberos client before configuring the Kerberos client programs.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html
index 69e3987..9798afc 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.5. Configurando un servidor Kerberos 5</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos y PAM" /><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Configuración de un Cliente Kerberos 5" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This i
 s an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.5. Configurando un servidor Kerberos 5" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.5. Configurando un servidor Kerberos 5</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.5. Configurando un servidor Kerberos 5</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos y PAM" /><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Configuración de un Cliente Kerberos 5" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">Th
 is is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.5. Configurando un servidor Kerberos 5" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.5. Configurando un servidor Kerberos 5</h3></div></div></div><div class="para">
 			Cuando se configure Kerberos, primero instale el KDC. Si es necesario configurar servidores esclavos, instale el maestro primero.
 		</div><div class="para">
 			Para configurar el primer KDC de Kerberos, siga estos pasos:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html
index 72e2a26..665a453 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.7. Mapeo dominio-a-reinado</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Configuración de un Cliente Kerberos 5" /><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Configurando KDCs secundarios" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.
 html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.7. Mapeo dominio-a-reinado" id="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.7. Mapeo dominio-a-reinado</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.7. Mapeo dominio-a-reinado</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Configuración de un Cliente Kerberos 5" /><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Configurando KDCs secundarios" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../
 toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.7. Mapeo dominio-a-reinado" id="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.7. Mapeo dominio-a-reinado</h3></div></div></div><div class="para">
 			Cuando un cliente intenta acceder a un servicio que corre en un servidor particular, sabe el nombre del (<span class="emphasis"><em>equipo</em></span>) del servicio y el nombre del servidor (<span class="emphasis"><em>foo.ejemplo.com</em></span>), pero como se pueden desplegar más de un reinado en su red, debe averiguar el nombre del reinado en el que reside el servicio.
 		</div><div class="para">
 			Por defecto, el nombre del territorio se toma como el nombre de dominio DNS del servidor, en mayúsculas.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-How_Kerberos_Works.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-How_Kerberos_Works.html
index e8acc75..afddaf0 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-How_Kerberos_Works.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-How_Kerberos_Works.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.3. Como Funciona Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Terminología de Kerberos" /><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos y PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your b
 rowser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.3. Como Funciona Kerberos" id="sect-Security_Guide-Kerberos-How_Kerberos_Works"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.3. Como Funciona Kerberos</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.3. Como Funciona Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Terminología de Kerberos" /><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos y PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade yo
 ur browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.3. Como Funciona Kerberos" id="sect-Security_Guide-Kerberos-How_Kerberos_Works"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.3. Como Funciona Kerberos</h3></div></div></div><div class="para">
 			Kerberos se diferencia de los métodos de autenticación de tipo nombre de usuario/contraseña. En lugar de autenticar cada usuario en cada servicio de red, Kerberos utiliza encriptaciones simétricas y un servicio adicional confiable (un KDC), para autenticar usuarios en conjunto de servicios de red. Cuando un usuario se autentica en el KDC, el KDC devuelve a la máquina del usuario en cuestión un comprobante específico para esa sesión, y cualquier servicio kerberizado busca el comprobante en la máquina del usuario, en lugar de pedir que el usuario se autentique utilizando una contraseña.
 		</div><div class="para">
 			Cuando un usuario kerberizado de una red se loguea en su estación de trabajo, su principal es enviado al KDC como parte de un pedido para un TGT del servidor de Autenticación. Este pedido puede ser enviado por el programa de logueo de modo que sea transparente para el usuario, o puede ser enviado por el programa <code class="command">kinit</code> luego que el usuario se haya logueado.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_Terminology.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_Terminology.html
index d5c6270..09ff444 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_Terminology.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_Terminology.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.2. Terminología de Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="next" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Como Funciona Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe dis
 play.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.2. Terminología de Kerberos" id="sect-Security_Guide-Kerberos-Kerberos_Terminology"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.2. Terminología de Kerberos</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.2. Terminología de Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="next" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Como Funciona Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe
  display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.2. Terminología de Kerberos" id="sect-Security_Guide-Kerberos-Kerberos_Terminology"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.2. Terminología de Kerberos</h3></div></div></div><div class="para">
 			Kerberos tiene su propia terminología para definir varios aspectos del servicio. Antes de aprender cómo funciona Kerberos, es importante conocer algunos de los siguientes términos:
 		</div><div class="variablelist"><dl><dt><span class="term">Servidor de autenticación (SA)</span></dt><dd><div class="para">
 						Un servidor que envía comprobantes (o tickets) para un servicio determinado, comprobantes que en su momento serán enviados a los usuarios para que puedan acceder a ese servicio. El AS responde con una petición a las solicitudes de los clientes que, o no tienen o no han enviado sus credenciales de autenticación. Generalmente, para tener acceso al servidor que emite las garantías de los comprobantes (TGS, por las siglas en inglés de Ticket-Granting Server), se envía un comprobante de obtención de garantía de comprobante (TGT, Ticket-Granting Ticket). Por último, el AS generalmente se ejecuta en el mismo equipo que el centro de distribución de claves (KDC, Key Distribution Center).
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_and_PAM.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_and_PAM.html
index a6d6bf9..80f7c67 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_and_PAM.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_and_PAM.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.4. Kerberos y PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Como Funciona Kerberos" /><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Configurando un servidor Kerberos 5" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to
  view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.4. Kerberos y PAM" id="sect-Security_Guide-Kerberos-Kerberos_and_PAM"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.4. Kerberos y PAM</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.4. Kerberos y PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Como Funciona Kerberos" /><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Configurando un servidor Kerberos 5" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe
 , to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.4. Kerberos y PAM" id="sect-Security_Guide-Kerberos-Kerberos_and_PAM"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.4. Kerberos y PAM</h3></div></div></div><div class="para">
 			Los servicios kerberizados actualmente no utilizan módulos de autenticación conectables (PAM, por las siglas en inglés de Pluggable Authentication Modules) — estos servicios evitan completamente a PAM. Sin embargo, las aplicaciones que utilicen PAM pueden utilizar a Kerberos para autenticarse si el módulo <code class="filename">pam_krb5</code> (provisto en el paquete <code class="filename">pam_krb5</code>) se encuentra instalado. El paquete <code class="filename">pam_krb5</code> contiene archivos de ejemplos de configuración que permiten que servicios como <code class="command">login</code> o <code class="command">gdm</code> puedan autenticar usuarios al mismo tiempo que obtienen credenciales de inicio utilizando sus contraseñas. Si el acceso a los servicios de red es siempre realizado utilizando servicios kerberizados, o servicios que utilicen GSS-API como por ejemplo lo es IMAP, entonces puede considerarse a la red como razonablemente segura.
 		</div><div class="important"><h2>Importante</h2><div class="para">
 				Los administradores deben tener la precaución de no permitir que los usuarios se autentiquen a determinados servicios de red, utilizando contraseñas Kerberos. Muchos protocolos utilizados por estos servicios no encriptan las contraseñas antes de enviarlas a través de la red, destruyendo los beneficios del sistema Kerberos. Por ejemplo, los usuarios no deberían tener permitido autenticarse a servicios Telnet con la misma contraseña que utilizan para la autenticación en Kerberos.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html
index 1ed07f4..8d1f08f 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.9. Configurando la autenticación cruzada de reinados</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Configurando KDCs secundarios" /><link rel="next" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Recursos adicionales" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.ht
 ml">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.9. Configurando la autenticación cruzada de reinados" id="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.9. Configurando la autenticación cruzada de reinados</h3></div></div></
 div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.9. Configurando la autenticación cruzada de reinados</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Configurando KDCs secundarios" /><link rel="next" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Recursos adicionales" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../to
 c.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.9. Configurando la autenticación cruzada de reinados" id="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.9. Configurando la autenticación cruzada de reinados</h3></div></di
 v></div><div class="para">
 			La <span class="emphasis"><em>autenticación cruzada de reinado</em></span> es el término usado para describir situaciones en que los clientes (normalmente usuarios) de un reinado utilizan Kerberos para autenticarse con servicios (típicamente procesos servidor corriendo en un sistema servidor particular) que pertenecen a otro reinado distinto al propio.
 		</div><div class="para">
 			Para el caso más simple, para que un cliente de un reinado con nombre <code class="literal">A.EJEMPLO.COM</code> acceda a un servicio en el reinado <code class="literal">B.EJEMPLO.COM</code>, ambos reinados deben compartir una clave para el principal con nombre <code class="literal">krbtgt/B.EJEMPLO.COM at A.EJEMPLO.COM</code>, y ambas claves deben tener el mismo número de versión de clave asociadas a ellas.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html
index ae451a7..ffaf717 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.8. Configurando KDCs secundarios</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Mapeo dominio-a-reinado" /><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Configurando la autenticación cruzada de reinados" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src=".
 ./../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.8. Configurando KDCs secundarios" id="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.8. Configurando KDCs secundarios</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.8. Configurando KDCs secundarios</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Mapeo dominio-a-reinado" /><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Configurando la autenticación cruzada de reinados" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" sr
 c="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.6.8. Configurando KDCs secundarios" id="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.8. Configurando KDCs secundarios</h3></div></div></div><div class="pa
 ra">
 			Por diversas razones, usted puede elegir ejecutar varios KDCs para un reinado dado. En este escenario, un KDC (el <span class="emphasis"><em>KDC maestro</em></span>) conserva una copia modificable de la base de datos del reinado, y ejecuta <code class="command">kadmind</code> (que también es el <span class="emphasis"><em>admin server</em></span> de su reinado), y uno o más KDCs (<span class="emphasis"><em>esclavos</em></span>) conservan copias de solo lectura de la base de datos, y ejecutan <code class="command">kpropd</code>.
 		</div><div class="para">
 			El procedimiento de propagación maestro-esclavo requiere que el KDC maestro vuelque su base de datos a un archivo de volcado temporal y luego transmita ese archivo a cada uno de sus esclavos, que luego sobreescriben sus copias sólo lectura de la base de datos recibidas antes, con el contenido del archivo de volcado.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos.html
index 9173200..ae22e97 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos.html
@@ -1,13 +1,13 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6. Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Libros relacionados" /><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Terminología de Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an ifr
 ame, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.6. Kerberos" id="sect-Security_Guide-Kerberos" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.6. Kerberos</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6. Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Libros relacionados" /><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Terminología de Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an
  iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.6. Kerberos" id="sect-Security_Guide-Kerberos" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.6. Kerberos</h2></div></div></div><div class="para">
 		La seguridad e integridad del sistema dentro de la red puede ser complejo. Puede necesitarse el tiempo de varios administradores solo para poder conocer qué servicios son los que están ejecutándose en una red, y la manera en que están siendo utilizados.
 	</div><div class="para">
 		Y más aún, la autenticación de usuarios en los servicios de red pueden ser peligrosa cuando los métodos usados por el protocolo sean inherentemente inseguros, como lo demuestran los protocolos tradicionales FTP y Telnet, que transfieren contraseñas no encriptadas sobre la red.
 	</div><div class="para">
 		Kerberos es una forma de eliminar la necesidad de protocolos que permitan métodos inseguros de autenticación, por lo que mejora la seguridad general de la red.
 	</div><div class="section" title="2.6.1. ¿Qué es Kerberos?" id="sect-Security_Guide-Kerberos-What_is_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.1. ¿Qué es Kerberos?</h3></div></div></div><div class="para">
-			Kerberos es un protocolo de autenticación de red creado por el MIT (Massachusetts Institute of Technology), y utiliza una criptografía de llave simétrica <sup>[<a id="id1684339" href="#ftn.id1684339" class="footnote">14</a>]</sup> para autenticar a los usuarios de los servicios de red, lo que en pocas palabras significa que las contraseñas nunca son enviadas a través de la red.
+			Kerberos es un protocolo de autenticación de red creado por el MIT (Massachusetts Institute of Technology), y utiliza una criptografía de llave simétrica <sup>[<a id="id1466365" href="#ftn.id1466365" class="footnote">14</a>]</sup> para autenticar a los usuarios de los servicios de red, lo que en pocas palabras significa que las contraseñas nunca son enviadas a través de la red.
 		</div><div class="para">
 			Consecuentemente, cuando los usuarios se autentican con servicios de red usando Kerberos, los usuarios no autorizados que intenten averiguar las contraseñas monitoreando el tráfico de red son efectivamente bloqueados.
 		</div><div class="section" title="2.6.1.1. Ventajas de Kerberos" id="sect-Security_Guide-What_is_Kerberos-Advantages_of_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.6.1.1. Ventajas de Kerberos</h4></div></div></div><div class="para">
@@ -30,6 +30,6 @@
 						Para que una aplicación utilice Kerberos, su origen debe ser modificado para que puede realizar las llamadas apropiadas a las bibliotecas de Kerberos. Las aplicaciones así modificadas son consideradas como <em class="firstterm">compatibles con Kerberos</em>, o <em class="firstterm">kerberizadas</em>. Para algunas, esto puede ser bastante problemático debido al tamaño de la aplicación o debido a su diseño. Para otras aplicaciones incompatibles, los cambios deben ser hechos de manera tal de permitir que el cliente y el servidor puedan comunicarse. De nuevo, esto puede necesitar una programación extensa. Las aplicaciones de código propietario que no tienen soporte para Kerberos por defecto, son por lo general las más problemáticas.
 					</div></li><li class="listitem"><div class="para">
 						Kerberos es una herramienta de tipo "todo o nada". Si Kerberos es utilizado en la red, cualquier contraseña no encriptada transferida a un servicio no compatible con Kerberos (o no Kerberizado), se encuentra en riesgo. Por lo tanto, la red no obtiene beneficio alguno al utilizarlo. Para asegurar una red con Kerberos, se debe utilizar versiones kerberizadas de <span class="emphasis"><em>todas</em></span> las aplicaciones de tipo servidor/cliente que transmitan contraseñas no encriptadas, o que no utilicen <span class="emphasis"><em>ninguna</em></span> de este tipo de aplicaciones.
-					</div></li></ul></div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id1684339" href="#id1684339" class="para">14</a>] </sup>
+					</div></li></ul></div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id1466365" href="#id1466365" class="para">14</a>] </sup>
 				Un sistema donde tanto el cliente como el servidor comparten una clave común que es utilizada para encriptar y desencriptar comunicaciones a través de una red.
 			</p></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Anterior</strong>2.5.5.3. Libros relacionados</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Siguiente</strong>2.6.2. Terminología de Kerberos</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html
index 04888d6..d8f4939 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.5. Enlaces de interés</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Lo que acaba de realizar" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. Archivos Encriptados 7-Zip" /></head><body class="toc_e
 mbeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.7.5. Enlaces de interés" id="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest"><div class="titlepage"><div><div keep-together.withi
 n-column="always"><h3 class="title">3.7.5. Enlaces de interés</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.5. Enlaces de interés</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Lo que acaba de realizar" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. Archivos Encriptados 7-Zip" /></head><body class="t
 oc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.7.5. Enlaces de interés" id="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest"><div class="titlepage"><div><div keep-together.w
 ithin-column="always"><h3 class="title">3.7.5. Enlaces de interés</h3></div></div></div><div class="para">
 			Para información adicional sobre LUKS, o encriptación de discos duros bajo Fedora, por favor visite alguno de los siguientes enlaces:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<a href="http://clemens.endorphin.org/LUKS/">LUKS - Linux Unified Key Setup</a>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html
index e8dd6d0..91bb206 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.3. Instrucciones paso a paso</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Encriptación manual de directorios" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Lo que acaba de rea
 lizar" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.7.3. Instrucciones paso a paso" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encry
 pting_Directories-Step_by_Step_Instructions"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.3. Instrucciones paso a paso</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.3. Instrucciones paso a paso</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Encriptación manual de directorios" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Lo que acaba de
  realizar" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.7.3. Instrucciones paso a paso" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_E
 ncrypting_Directories-Step_by_Step_Instructions"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.3. Instrucciones paso a paso</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					Ingrese a nivel de ejecución 1: <code class="code">telinit 1</code>
 				</div></li><li class="listitem"><div class="para">
 					Desmonte su /home actual: <code class="code"> umount /home</code>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html
index c229aa3..89603bf 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.4. Lo que acaba de realizar</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Instrucciones paso a paso" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Enlaces de interés" /></head><body class="toc_emb
 eded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.7.4. Lo que acaba de realizar" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished"><div c
 lass="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.4. Lo que acaba de realizar</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.4. Lo que acaba de realizar</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Instrucciones paso a paso" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Enlaces de interés" /></head><body class="toc
 _embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.7.4. Lo que acaba de realizar" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished"><d
 iv class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.4. Lo que acaba de realizar</h3></div></div></div><div class="para">
 			Felicitaciones, ahora tiene una partición encriptada para que todos sus datos reposen en forma segura cuando su equipo se encuentre apagado.
 		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Anterior</strong>3.7.3. Instrucciones paso a paso</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Siguiente</strong>3.7.5. Enlaces de interés</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html
index dcccbb1..e63b029 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.2. Encriptación manual de directorios</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Instrucciones pa
 so a paso" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.7.2. Encriptación manual de directorios" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories"><div 
 class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.2. Encriptación manual de directorios</h3></div></div></div><div class="warning"><h2>Advertencia</h2><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.2. Encriptación manual de directorios</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Instruccione
 s paso a paso" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="3.7.2. Encriptación manual de directorios" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories"><
 div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.2. Encriptación manual de directorios</h3></div></div></div><div class="warning"><h2>Advertencia</h2><div class="para">
 				Al seguir este procedimiento se eliminarán todos los datos de la partición que está encriptando. ¡Perderá toda la información! ¡Asegúrese de hacer un respaldo de sus datos en una fuente externa antes de comenzar!
 			</div></div><div class="para">
 			Si está corriendo una versión de Fedora anterior a la 9 y quiere encriptar una partición, o si quiere encriptar una partición después de la instalación de la versión actual de Fedora, las siguientes instrucciones son para Ud. El ejemplo que ofrecemos más abajo muestra la encriptación de una partición /home pero puede utilizarse sobre cualquier partición.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html
index 969de7f..6565ad6 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Encriptación manual de directorios" /></head><body class="
 toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" id="sect-Security_Guide-LUKS_Disk_Encryption" lang="es-ES"><div class="titlepage"
 ><div><div keep-together.within-column="always"><h2 class="title">3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Capítulo 3. Encriptación" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Shell seguro (SSH, por las iniciales en inglés de Secure Shell)" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Encriptación manual de directorios" /></head><body cla
 ss="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)" id="sect-Security_Guide-LUKS_Disk_Encryption" lang="es-ES"><div class="titlep
 age"><div><div keep-together.within-column="always"><h2 class="title">3.7. Encriptación de disco LUKS (Linux Unified Key Setup-on-disk-format)</h2></div></div></div><div class="para">
 		La Configuración de Clave Unificada de Linux en el formato de disco (o LUKS por sus iniciales en inglés) le permite encriptar particiones en su computadora Linux. Esto es particularmente importante cuando se trata de computadores móviles y de medios removibles. LUKS le permite claves múltiples de usuario para desencriptar una clave maestra que se usa para la encriptación de la partición.
 	</div><div class="section" title="3.7.1. Implementación de LUKS en Fedora" id="sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.1. Implementación de LUKS en Fedora</h3></div></div></div><div class="para">
 			Fedora 9, and later, utilizes LUKS to perform file system encryption. By default, the option to encrypt the file system is unchecked during the installation. If you select the option to encrypt you hard drive, you will be prompted for a passphrase that will be asked every time you boot the computer. This passphrase "unlocks" the bulk encryption key that is used to decrypt your partition. If you choose to modify the default partition table you can choose which partitions you want to encrypt. This is set in the partition table settings
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Access_Control.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Access_Control.html
index 9357f1b..acd98dc 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Access_Control.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Access_Control.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.2. Control de acceso</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Campos de opción" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Campos de opción" /><link rel="next" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Comandos de la consola" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="
 toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.2.2.2. Control de acceso" id="sect-Security_Guide-Option_Fields-Access_Control"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.2. Control de acceso</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.2. Control de acceso</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Campos de opción" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Campos de opción" /><link rel="next" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Comandos de la consola" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" cla
 ss="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.2.2.2. Control de acceso" id="sect-Security_Guide-Option_Fields-Access_Control"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.2. Control de acceso</h5></div></div></div><div class="para">
 					Los campos de opción también le permiten a los administradores permitir o negar explícitamente equipos mediante una sola regla, añadiéndole la directiva <code class="option">allow</code> o <code class="option">deny</code> como la opción final.
 				</div><div class="para">
 					Por ejemplo, las dos reglas siguientes permiten conexions SSH desde <code class="systemitem">client-1.example.com</code>, pero niegan conexiones de <code class="systemitem">client-2.example.com</code>:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Expansions.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Expansions.html
index 8c3b93c..687296d 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Expansions.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Expansions.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.4. Expansiones</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Campos de opción" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Comandos de la consola" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">Thi
 s is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.2.2.4. Expansiones" id="sect-Security_Guide-Option_Fields-Expansions"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.4. Expansiones</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.4. Expansiones</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Campos de opción" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Comandos de la consola" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html"
 >This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.2.2.4. Expansiones" id="sect-Security_Guide-Option_Fields-Expansions"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.4. Expansiones</h5></div></div></div><div class="para">
 					Cuando se utilizan junto a las directivas <code class="command">spawn</code> y <code class="command">twist</code>, las expansiones proveen información acerca del cliente, servidor, y los procesos involucrados.
 				</div><div class="para">
 					La siguiente es una lista de expansiones soportadas:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Shell_Commands.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Shell_Commands.html
index 4eab54d..14cc951 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Shell_Commands.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Shell_Commands.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.3. Comandos de la consola</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Campos de opción" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Control de acceso" /><link rel="next" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Expansiones" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.
 html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.2.2.3. Comandos de la consola" id="sect-Security_Guide-Option_Fields-Shell_Commands"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.3. Comandos de la consola</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.3. Comandos de la consola</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Campos de opción" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Control de acceso" /><link rel="next" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Expansiones" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../
 toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.2.2.3. Comandos de la consola" id="sect-Security_Guide-Option_Fields-Shell_Commands"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.3. Comandos de la consola</h5></div></div></div><div class="para">
 					Los campos de opción permiten reglas de acceso para iniciar comandos de consola mediante las dos directivas siguientes:
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="command">spawn</code> — Inicia un comando de terminal como un proceso hijo. Esta directiva puede realizar tareas como ser la utilización de <code class="command">/usr/sbin/safe_finger</code> para obtener mayor información acerca del cliente que está realizando una determinada petición, o crear archivos de registro especiales mediante la utilización del comando <code class="command">echo</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html
index 5cb7a28..4aec548 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.2. Bandera de control</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. Formato del archivo de configuración de PAM" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. Formato del archivo de configuración de PAM" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Nombre de módulo"
  /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.3.2. Bandera de control" id="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag"><div class="titlepage"><div><di
 v keep-together.within-column="always"><h4 class="title">2.4.3.2. Bandera de control</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.2. Bandera de control</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. Formato del archivo de configuración de PAM" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. Formato del archivo de configuración de PAM" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Nombre de mód
 ulo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.3.2. Bandera de control" id="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag"><div class="titlepage"><div
 ><div keep-together.within-column="always"><h4 class="title">2.4.3.2. Bandera de control</h4></div></div></div><div class="para">
 				Todos los módulos PAM generan un resultado de éxito o fracaso cuando son llamados. Las banderas de control le dicen a PAM qué hacer con el resultado. Los módulos se pueden apilar en un orden particular, y las banderas de control determinan cuán importante es el éxito o el fracaso de un módulo particular para el objetivo general de autenticación del usuario con el servicio.
 			</div><div class="para">
 				Hay cuatro banderas de control predefinidas:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html
index 4e3e152..b0f6b0a 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.4. Argumentos del módulo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. Formato del archivo de configuración de PAM" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Nombre de módulo" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Ejemplos de archivos de configuración d
 e PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.3.4. Argumentos del módulo" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments"><div class="titl
 epage"><div><div keep-together.within-column="always"><h4 class="title">2.4.3.4. Argumentos del módulo</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.4. Argumentos del módulo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. Formato del archivo de configuración de PAM" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Nombre de módulo" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Ejemplos de archivos de configuraciÃ
 ³n de PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.3.4. Argumentos del módulo" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments"><div class="
 titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.3.4. Argumentos del módulo</h4></div></div></div><div class="para">
 				Para algunos módulos, PAM utiliza <em class="firstterm">argumentos</em> para pasar información a un módulo conectable durante la autenticación.
 			</div><div class="para">
 				Por ejemplo, el módulo <code class="filename">pam_userdb.so</code> utiliza información almacenada en un archivo de base de datos Berkeley para autenticar al usuario. Berkeley es una base de datos de código abierto que se encuentra en muchas otras aplicaciones. El módulo toma un argumento <code class="filename">db</code> de modo que Berkeley sepa qué base de datos utilizar para el servicio solicitado.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html
index c84f040..369f375 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.3. Nombre de módulo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. Formato del archivo de configuración de PAM" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html" title="2.4.3.2. Bandera de control" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Argumentos del módulo" /></head><body class="toc_embeded "><d
 iv id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.3.3. Nombre de módulo" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4
 .3.3. Nombre de módulo</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.3. Nombre de módulo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. Formato del archivo de configuración de PAM" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html" title="2.4.3.2. Bandera de control" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Argumentos del módulo" /></head><body class="toc_embeded 
 "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.3.3. Nombre de módulo" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title"
 >2.4.3.3. Nombre de módulo</h4></div></div></div><div class="para">
 				El nombre del módulo ofrece a PAM el nombre del módulo conectable que contiene la interfaz del módulo especificada. En versiones anteriores de Fedora la dirección completa al módulo era provista en el archivo de configuración de PAM. Sin embargo, desde la aparición de los sistemas <em class="firstterm">multilib</em>, que almacenan modulos PAM de 64-bit en el directorio <code class="filename">/lib64/security/</code>, el nombre del directorio es omitido dado que la aplicación está enlazada con la versión correcta de <code class="filename">libpam</code>, que puede encontrar la versión correcta del módulo.
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Anterior</strong>2.4.3.2. Bandera de control</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Siguiente</strong>2.4.3.4. Argumentos del módulo</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html
index dd18c88..0c16324 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.6.2. Directivas comunes de pam_timestamp_check</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM y el cacheo de la credencial administrativa" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM y el cacheo de la credencial administrativa" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modu
 les_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM y la propiedad de los dispositivos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.
 6.2. Directivas comunes de pam_timestamp_check" id="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.6.2. Directivas comunes de pam_timestamp_check</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.6.2. Directivas comunes de pam_timestamp_check</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM y el cacheo de la credencial administrativa" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM y el cacheo de la credencial administrativa" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_
 Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM y la propiedad de los dispositivos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="
 2.4.6.2. Directivas comunes de pam_timestamp_check" id="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.6.2. Directivas comunes de pam_timestamp_check</h4></div></div></div><div class="para">
 				El módulo <code class="filename">pam_timestamp.so</code> acepta varias indicaciones. Las siguientes dos opciones son algunas de las más utilizadas:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="command">timestamp_timeout</code> — Especifica el periodo (en segundos) durante el cual el archivo de registro de tiempo es válido. El valor establecido por defecto es 300 (cinco minutos).
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html
index c361c35..452b79c 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.7.2. Acceso a aplicaciones</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM y la propiedad de los dispositivos" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM y la propiedad de los dispositivos" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Recursos adicionales" /
 ></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.7.2. Acceso a aplicaciones" id="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access"><div class="titlep
 age"><div><div keep-together.within-column="always"><h4 class="title">2.4.7.2. Acceso a aplicaciones</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.7.2. Acceso a aplicaciones</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM y la propiedad de los dispositivos" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM y la propiedad de los dispositivos" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Recursos adicionale
 s" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.7.2. Acceso a aplicaciones" id="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access"><div class="ti
 tlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.7.2. Acceso a aplicaciones</h4></div></div></div><div class="para">
 				El usuario de la consola también tiene el acceso a ciertos programas configurados para usar el directorio <code class="filename">/etc/security/console.apps/</code>.
 			</div><div class="para">
 				Este directorio contiene los archivos de configuración que habilitan al usuario de la consola correr ciertas aplicaciones de <code class="filename">/sbin</code> y <code class="filename">/usr/sbin</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html
index 0cca0e2..38db526 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.8. Recursos adicionales</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html" title="2.4.7.2. Acceso a aplicaciones" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Sitios web útiles sobre PAM"
  /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.8. Recursos adicionales" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources"><div class="titlepage"><div><div keep-to
 gether.within-column="always"><h3 class="title">2.4.8. Recursos adicionales</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.8. Recursos adicionales</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html" title="2.4.7.2. Acceso a aplicaciones" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Sitios web útiles sobre 
 PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.8. Recursos adicionales" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources"><div class="titlepage"><div><div kee
 p-together.within-column="always"><h3 class="title">2.4.8. Recursos adicionales</h3></div></div></div><div class="para">
 			Los siguientes recursos explican más detalladamente los métodos para usar y configurar PAM. Además de estos recursos, lea los archivos de configuración de PAM en el sistema para entender mejor cómo están estructurados.
 		</div><div class="section" title="2.4.8.1. Documentación de PAM instalada" id="sect-Security_Guide-Additional_Resources-Installed_PAM_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.8.1. Documentación de PAM instalada</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Las páginas man relacionadas con PAM — Hay varias páginas man para las distintas aplicaciones y archivos de configuración involucrados con PAM. La siguiente es un alista de alguna de las páginas man más importantes.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html
index 8ddf351..4d11475 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.5. Creación de los módulos PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Ejemplos de archivos de configuración de PAM" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-
 PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM y el cacheo de la credencial administrativa" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Siguiente</strong></a></li></ul><div cla
 ss="section" title="2.4.5. Creación de los módulos PAM" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.5. Creación de los módulos PAM</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.5. Creación de los módulos PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Ejemplos de archivos de configuración de PAM" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_
 PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM y el cacheo de la credencial administrativa" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Siguiente</strong></a></li></ul><div
  class="section" title="2.4.5. Creación de los módulos PAM" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.5. Creación de los módulos PAM</h3></div></div></div><div class="para">
 			Puede crear o añadir en cualquier momento nuevos módulos PAM, para utilizarlos con cualquier aplicación con tengan este soporte.
 		</div><div class="para">
 			Por ejemplo, un desarrollador puede crear un método para generar contraseñas que sean utilizadas sólo una vez, y escribir un módulo PAM que pueda soportarlo. Los programas que tengan soporte para PAM podrán utilizar inmediatamente este módulo, y el método de contraseña, sin por ello tener que ser recompilados o modificados en alguna manera.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html
index bf63240..25a0b5e 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3. Formato del archivo de configuración de PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html" title="2.4.2. Archivos de configuración de PAM" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Fla
 g.html" title="2.4.3.2. Bandera de control" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.3. Formato del archivo de configuración de PAM" id="sect-Security_Guide-Pluggable_Aut
 hentication_Modules_PAM-PAM_Configuration_File_Format"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.3. Formato del archivo de configuración de PAM</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3. Formato del archivo de configuración de PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html" title="2.4.2. Archivos de configuración de PAM" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Control
 _Flag.html" title="2.4.3.2. Bandera de control" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.3. Formato del archivo de configuración de PAM" id="sect-Security_Guide-Pluggable
 _Authentication_Modules_PAM-PAM_Configuration_File_Format"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.3. Formato del archivo de configuración de PAM</h3></div></div></div><div class="para">
 			Cada archivo de configuración PAM contiene un grupo de directivas formateadas como sigue:
 		</div><pre class="screen"><em class="replaceable"><code>&lt;module interface&gt;</code></em>  <em class="replaceable"><code>&lt;control flag&gt;</code></em>   <em class="replaceable"><code>&lt;module name&gt;</code></em>   <em class="replaceable"><code>&lt;module arguments&gt;</code></em>
 </pre><div class="para">
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html
index f3ee7f9..d375841 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.2. Archivos de configuración de PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="next" href="sect-Security_Guide-P
 luggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. Formato del archivo de configuración de PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.
 4.2. Archivos de configuración de PAM" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.2. Archivos de configuración de PAM</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.2. Archivos de configuración de PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="next" href="sect-Security_Gui
 de-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. Formato del archivo de configuración de PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Siguiente</strong></a></li></ul><div class="section" title
 ="2.4.2. Archivos de configuración de PAM" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.2. Archivos de configuración de PAM</h3></div></div></div><div class="para">
 			El directorio <code class="filename">/etc/pam.d/</code> contiene los archivos de configuración de PAM para cada aplicación que utilice PAM. En versiones anteriores de PAM, se usaba el archivo <code class="filename">/etc/pam.conf</code>, pero este archivo se dejado de usar y sólo se utilizará si el directorio <code class="filename">/etc/pam.d/</code> no existe.
 		</div><div class="section" title="2.4.2.1. Archivos del servicio PAM" id="sect-Security_Guide-PAM_Configuration_Files-PAM_Service_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.2.1. Archivos del servicio PAM</h4></div></div></div><div class="para">
 				Cada aplicación con capacidades PAM o <em class="firstterm">servicio</em> tiene un archivo en el directorio <code class="filename">/etc/pam.d/</code>. Cada archivo en este directorio tiene el mismo nombre del servicio al que controla el acceso.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html
index f873ebb..8ac9798 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.6. PAM y el cacheo de la credencial administrativa</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html" title="2.4.5. Creación de los módulos PAM" /><link rel="next" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Com
 mon_pam_timestamp_Directives.html" title="2.4.6.2. Directivas comunes de pam_timestamp_check" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.6. PAM y
  el cacheo de la credencial administrativa" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.6. PAM y el cacheo de la credencial administrativa</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.6. PAM y el cacheo de la credencial administrativa</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html" title="2.4.5. Creación de los módulos PAM" /><link rel="next" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching
 -Common_pam_timestamp_Directives.html" title="2.4.6.2. Directivas comunes de pam_timestamp_check" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.6. P
 AM y el cacheo de la credencial administrativa" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.6. PAM y el cacheo de la credencial administrativa</h3></div></div></div><div class="para">
 			Una cantidad de herramientas administrativas gráficas en Fedora le ofrecen a los usuarios un elevado grado de privilegio, durante un período de tiempo de hasta cinco minutos, utilizando el módulo <code class="filename">pam_timestamp.so</code>. Es importante entender como funciona este mecanismo, ya que si algún usuario abandona la terminal mientras continue vigente <code class="filename">pam_timestamp.so</code>, dejará a ese equipo libre para ser manipulado por quienquiera que tenga acceso físico a la consola.
 		</div><div class="para">
 			En el esquema del registro del tiempo de PAM, cuando es iniciada la aplicación administrativa gráfica, solicita al usuario la contraseña de root. Cuando el usuario ha sido autenticado, el módulo <code class="filename">pam_timestamp.so</code> crea un archivo de registro de tiempo. Por defecto, es creado en el directorio <code class="filename">/var/run/sudo/</code>. Si el archivo ya existe, los programas administrativos gráficos no solicitarán una contraseña. En su lugar, el módulo <code class="filename">pam_timestamp.so</code> actualizará el archivo de registro de tiempo, reservando cinco minutos extra de acceso administrativo sin contraseñas al usuario.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html
index dbc72de..00fad8a 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.7. PAM y la propiedad de los dispositivos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html" title="2.4.6.2. Directivas comunes de pam_timestamp_check" /><link rel="next" href="sect-Security_Guide-PAM_and_Device_Ownership
 -Application_Access.html" title="2.4.7.2. Acceso a aplicaciones" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.7. PAM y la propiedad de los dispositivos" id="sect
 -Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.7. PAM y la propiedad de los dispositivos</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.7. PAM y la propiedad de los dispositivos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html" title="2.4.6.2. Directivas comunes de pam_timestamp_check" /><link rel="next" href="sect-Security_Guide-PAM_and_Device_Owner
 ship-Application_Access.html" title="2.4.7.2. Acceso a aplicaciones" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.7. PAM y la propiedad de los dispositivos" id="
 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.7. PAM y la propiedad de los dispositivos</h3></div></div></div><div class="para">
 			En Fedora, el primer usuario que se registra en la consola física de la máquina, puede manipular ciertos dispositivos y realizar ciertas tareas que por lo general son reservadas al usuario root. Esto es controlado por un módulo PAM denominado <code class="filename">pam_console.so</code>.
 		</div><div class="section" title="2.4.7.1. Propiedad de los dispositivos" id="sect-Security_Guide-PAM_and_Device_Ownership-Device_Ownership"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.7.1. Propiedad de los dispositivos</h4></div></div></div><div class="para">
 				Cuando un usuario se registra en un sistema Fedora, el módulo <code class="filename">pam_console.so</code> es llamado mediante el comando <code class="command">login</code>, o mediante algunos de los programa gráficos de logueo, como ser <span class="application"><strong>gdm</strong></span>, <span class="application"><strong>kdm</strong></span>, y <span class="application"><strong>xdm</strong></span>. Si este usuario es el primero en loguearse en la consola física — denominada <em class="firstterm">consola del usuario</em> — el modulo le asegura al usuario el dominio de una gran variedad de dispositivos que normalmente le pertenecen al usuario root. Estos dispositivos le pertenecen a la consola del usuario hasta que finalice su última sesión local. Una vez que este usuario haya finalizado su sesión, la pertenencia de los dispositivos vuelve a ser del usuario root.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html
index 070b44e..1ab5c47 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.4. Ejemplos de archivos de configuración de PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Argumentos del módulo" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"
  title="2.4.5. Creación de los módulos PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.4. Ejemplos de archivos de configuración de PAM" id="sect-Security_Guide-Pluggable
 _Authentication_Modules_PAM-Sample_PAM_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.4. Ejemplos de archivos de configuración de PAM</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.4. Ejemplos de archivos de configuración de PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Argumentos del módulo" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.h
 tml" title="2.4.5. Creación de los módulos PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.4.4. Ejemplos de archivos de configuración de PAM" id="sect-Security_Guide-Plugg
 able_Authentication_Modules_PAM-Sample_PAM_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.4. Ejemplos de archivos de configuración de PAM</h3></div></div></div><div class="para">
 			La siguiente es una muestra del archivo de configuración PAM de una aplicación:
 		</div><pre class="screen">#%PAM-1.0
 auth		required  pam_securetty.so
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html
index 934dfe5..3d2a371 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" title="2.3.5. Configurar Firefox para la utilización de Kerberos como SSO" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configu
 ration_Files.html" title="2.4.2. Archivos de configuración de PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.4. Módulos de autenticaciÃ
 ³n conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" title="2.3.5. Configurar Firefox para la utilización de Kerberos como SSO" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Con
 figuration_Files.html" title="2.4.2. Archivos de configuración de PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.4. Módulos de autentic
 ación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.4. Módulos de autenticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)</h2></div></div></div><div class="para">
 		Los programas que permiten el acceso del usuario a un sistema usan la <em class="firstterm">autenticación</em> para verificar la identidad de cada uno (es decir, para establecer que el usuario es quien dice ser).
 	</div><div class="para">
 		Históricamente, cada programa tenía su propia forma de autenticar los usuarios. En Fedora, muchos programas se configuran para usar el mecanismo de autenticación centralizado llamado <em class="firstterm">Módulos de Autenticación Conectables</em> (<acronym class="acronym">PAM</acronym>).
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html
index a4556ae..093cb87 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>5.2. Utilice encriptado de particiones mediante LUKS</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Secure_Installation.html" title="Capítulo 5. Instalación segura" /><link rel="prev" href="chap-Security_Guide-Secure_Installation.html" title="Capítulo 5. Instalación segura" /><link rel="next" href="chap-Security_Guide-Software_Maintenance.html" title="Capítulo 6. Mantenimiento de Software" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../..
 /toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Secure_Installation.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Software_Maintenance.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="5.2. Utilice encriptado de particiones mediante LUKS" id="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">5.2. Utilice encriptado de particiones mediante LUKS</h2></div></div></div><div class="para
 ">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>5.2. Utilice encriptado de particiones mediante LUKS</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Secure_Installation.html" title="Capítulo 5. Instalación segura" /><link rel="prev" href="chap-Security_Guide-Secure_Installation.html" title="Capítulo 5. Instalación segura" /><link rel="next" href="chap-Security_Guide-Software_Maintenance.html" title="Capítulo 6. Mantenimiento de Software" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../.
 ./../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Secure_Installation.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Software_Maintenance.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="5.2. Utilice encriptado de particiones mediante LUKS" id="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">5.2. Utilice encriptado de particiones mediante LUKS</h2></div></div></div><div class="
 para">
 			Desde Fedora 9 la implementación de <a href="http://fedoraproject.org/wiki/Security_Guide/9/LUKSDiskEncryption">Linux Unified Key Setup-on-disk-format</a> (LUKS) ha permitido que el encriptado sea algo mucho más sencillo. A lo largo del proceso de instalación se le presenta una opción al usuario que le permite encriptar sus particiones. El usuario debe suministrar una frase de acceso que será la llave para desbloquear el encriptado en masa que se utilizará para proteger los datos de las particiones.
 		</div><div class="para">
 			A pesar que Fedora 8 no posea soporte LUKS establecido por defecto, éste puede ser fácilmente implementado. En este enlace están disponibles las <a href="http://fedoraproject.org/wiki/Security_Guide/9/LUKSDiskEncryption#Step-by-Step_Instructions">instrucciones-paso-a-paso</a> que permiten al usuario implementar el encriptado de particiones en su instalación de Fedora.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Anonymous_Access.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Anonymous_Access.html
index de9ef8a..81e51cd 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Anonymous_Access.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Anonymous_Access.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.2. Acceso anónimo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. Asegurando FTP" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. Asegurando FTP" /><link rel="next" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Cuentas de usuario" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view
  it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.6.2. Acceso anónimo" id="sect-Security_Guide-Securing_FTP-Anonymous_Access"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.2. Acceso anónimo</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.2. Acceso anónimo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. Asegurando FTP" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. Asegurando FTP" /><link rel="next" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Cuentas de usuario" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to 
 view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.6.2. Acceso anónimo" id="sect-Security_Guide-Securing_FTP-Anonymous_Access"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.2. Acceso anónimo</h4></div></div></div><div class="para">
 				La presencia del directorio <code class="filename">/var/ftp/</code> activa la cuenta anónima.
 			</div><div class="para">
 				La forma más sencilla de crear este directorio es instalando el paquete <code class="filename">vsftpd</code>. Este paquete establece un árbol de directorios para usuarios anónimos y configura los permisos de manera tal que estos usuarios sólo puedan leer sus contenidos.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html
index 52fe159..ae79760 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.4. Utilice encapsuladores TCP para el control de acceso</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. Asegurando FTP" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Cuentas de usuario" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Asegurando Sendmail" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src=".
 ./../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.6.4. Utilice encapsuladores TCP para el control de acceso" id="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.4. Utilice encapsuladores TCP para el control de acc
 eso</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.4. Utilice encapsuladores TCP para el control de acceso</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. Asegurando FTP" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Cuentas de usuario" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Asegurando Sendmail" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" sr
 c="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.6.4. Utilice encapsuladores TCP para el control de acceso" id="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.4. Utilice encapsuladores TCP para el control de
  acceso</h4></div></div></div><div class="para">
 				Use TCP Wrappers to control access to either FTP daemon as outlined in <a class="xref" href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Securing_Services_With_TCP_Wrappers_and_xinetd-Enhancing_Security_With_TCP_Wrappers" title="2.2.1.1. Mejorando la seguridad utilizando encapsuladores TCP">Sección 2.2.1.1, “Mejorando la seguridad utilizando encapsuladores TCP”</a>.
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Anterior</strong>2.2.6.3. Cuentas de usuario</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Siguiente</strong>2.2.7. Asegurando Sendmail</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-User_Accounts.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-User_Accounts.html
index bb12d23..4a523d7 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-User_Accounts.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-User_Accounts.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.3. Cuentas de usuario</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. Asegurando FTP" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Acceso anónimo" /><link rel="next" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Utilice encapsuladores TCP para el control de acceso" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" cla
 ss="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.6.3. Cuentas de usuario" id="sect-Security_Guide-Securing_FTP-User_Accounts"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.3. Cuentas de usuario</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.3. Cuentas de usuario</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. Asegurando FTP" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Acceso anónimo" /><link rel="next" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Utilice encapsuladores TCP para el control de acceso" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe"
  class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.6.3. Cuentas de usuario" id="sect-Security_Guide-Securing_FTP-User_Accounts"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.3. Cuentas de usuario</h4></div></div></div><div class="para">
 				Debido a que FTP transmite para su autenticación nombres de usuario y contraseñas sin encriptarse sobre redes no seguras, es una buena idea la de negar a los usuarios del sistema el acceso al servidor desde sus cuentas de usuario.
 			</div><div class="para">
 				Para deshabilitar todas las cuentas de usuario en <code class="command">vsftpd</code>, agregue la siguiente directiva en <code class="filename">/etc/vsftpd/vsftpd.conf</code>:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html
index 107d22e..a4012a0 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.2. Cuidado con los errores de sintaxis</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. Asegurando NFS" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. Asegurando NFS" /><link rel="next" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. No utilice la opción no_root_squash" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" clas
 s="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.4.2. Cuidado con los errores de sintaxis" id="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.2. Cuidado con los errores de sintaxis</h4></div
 ></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.2. Cuidado con los errores de sintaxis</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. Asegurando NFS" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. Asegurando NFS" /><link rel="next" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. No utilice la opción no_root_squash" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" 
 class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.4.2. Cuidado con los errores de sintaxis" id="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.2. Cuidado con los errores de sintaxis</h4><
 /div></div></div><div class="para">
 				El servidor NFS determina qué sistemas de archivos exportar y hacia qué equipos hacerlo al consultar el archivo <code class="filename">/etc/exports</code>. Tenga cuidado de no agregar espacios extraños cuando edite este archivo.
 			</div><div class="para">
 				Por ejemplo, la siguiente línea en el archivo <code class="filename">/etc/exports</code> comparte el directorio <code class="command">/tmp/nfs/</code> con el equipo <code class="command">juan.ejemplo.com</code> con permisos de lectura y escritura.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html
index a8324b6..2610b8a 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.3. No utilice la opción no_root_squash</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. Asegurando NFS" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Cuidado con los errores de sintaxis" /><link rel="next" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. Configuración del cortafuego de NFS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifr
 ame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.4.3. No utilice la opción no_root_squash" id="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.3. No utilice 
 la opción <code class="command">no_root_squash</code></h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.3. No utilice la opción no_root_squash</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. Asegurando NFS" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Cuidado con los errores de sintaxis" /><link rel="next" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. Configuración del cortafuego de NFS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc">
 <iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.4.3. No utilice la opción no_root_squash" id="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.3. No util
 ice la opción <code class="command">no_root_squash</code></h4></div></div></div><div class="para">
 				Por defecto, al utilizarse para compartir elementos, NFS cambia el usuario root al usuario <code class="command">nfsnobody</code>, una cuenta de usuario sin privilegios. Esto modifica la pertenencia de todos los archivos creados por el usuario root, y se los otorga a <code class="command">nfsnobody</code>, evitando de esta forma la carga de programas definidos con bit de tipo setuid.
 			</div><div class="para">
 				Si se utiliza <code class="command">no_root_squash</code>, los usuarios root remotos tienen la posibilidad de modificar cualquier archivo en el sistema de archivos compartido, y dejar aplicaciones infectadas con troyanos para que otros usuarios las ejecuten sin saberlo.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html
index 5251506..ad53cdd 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.4. Configuración del cortafuego de NFS</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. Asegurando NFS" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. No utilice la opción no_root_squash" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. Asegurando el servidor HTTP Apache" /></head><body class="toc_embeded "><div id="tocdiv
 " class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.4.4. Configuración del cortafuego de NFS" id="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class
 ="title">2.2.4.4. Configuración del cortafuego de NFS</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.4. Configuración del cortafuego de NFS</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. Asegurando NFS" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. No utilice la opción no_root_squash" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. Asegurando el servidor HTTP Apache" /></head><body class="toc_embeded "><div id="to
 cdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.4.4. Configuración del cortafuego de NFS" id="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 c
 lass="title">2.2.4.4. Configuración del cortafuego de NFS</h4></div></div></div><div class="para">
 				Los puertos utilizados por NFS están dinámicamente asignados por rpcbind, y esto puede causar problemas en el momento de crear reglas de cortafuegos. Para simplificar este proceso, utilice el archivo <span class="emphasis"><em>/etc/sysconfig/nfs</em></span> para especificar qué puertos deben ser utilizados:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="command">MOUNTD_PORT</code> — puerto TCP y UDP para mountd (rpc.mountd)
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html
index 79a081d..a2abe74 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.4. Asigne puertos estáticos y utilice reglas de iptables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Editar el archivo /var/yp/securenets" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Use autenticación con Kerberos" /></head><body class="toc_embeded "><div id="toc
 div" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.3.4. Asigne puertos estáticos y utilice reglas de iptables" id="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules"><div class="titlepage"><div><div keep-together.within-co
 lumn="always"><h4 class="title">2.2.3.4. Asigne puertos estáticos y utilice reglas de iptables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.4. Asigne puertos estáticos y utilice reglas de iptables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Editar el archivo /var/yp/securenets" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Use autenticación con Kerberos" /></head><body class="toc_embeded "><div id=
 "tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.3.4. Asigne puertos estáticos y utilice reglas de iptables" id="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules"><div class="titlepage"><div><div keep-together.withi
 n-column="always"><h4 class="title">2.2.3.4. Asigne puertos estáticos y utilice reglas de iptables</h4></div></div></div><div class="para">
 				A todos los servidores relacionados con NIS se les puede asignar un puerto específico, excepto <code class="command">rpc.yppasswdd</code> — el demonio que permite a los usuarios modificar sus contraseñas de logueo. Asignar puertos a <code class="command">rpc.ypxfrd</code> y <code class="command">ypserv</code>, los restantes demonios de servidores NIS, permite la creación de reglas de cortafuegos, y de esta manera poder proteger a los demonios de futuras intrusiones.
 			</div><div class="para">
 				Para hacerlo, agregue las siguientes líneas en <code class="filename">/etc/sysconfig/network</code>:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html
index 25c9982..7b3bf7a 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.3. Editar el archivo /var/yp/securenets</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Utilización de nombres de dominio y de equipo NIS, de modo similar a una contraseña" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Asigne puertos e
 státicos y utilice reglas de iptables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.3.3. Editar el archivo /var/yp/securenets" id="sect-Security_Guide-Securing_
 NIS-Edit_the_varypsecurenets_File"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.3.3. Editar el archivo <code class="filename">/var/yp/securenets</code></h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.3. Editar el archivo /var/yp/securenets</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Utilización de nombres de dominio y de equipo NIS, de modo similar a una contraseña" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Asigne puert
 os estáticos y utilice reglas de iptables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.3.3. Editar el archivo /var/yp/securenets" id="sect-Security_Guide-Secur
 ing_NIS-Edit_the_varypsecurenets_File"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.3.3. Editar el archivo <code class="filename">/var/yp/securenets</code></h4></div></div></div><div class="para">
 				Si el archivo <code class="filename">/var/yp/securenets</code> está vacío o no existe (como es el caso luego de una instalación por defecto), NIS escucha a todos los puertos. Una de las primeras cosas a realizar es ingresar pares máscara de red/red (netmask/network) en el archivo de modo que <code class="command">ypserv</code> solo responda a las peticiones de una red adecuada.
 			</div><div class="para">
 				A continuación se muestra una entrada de ejemplo del archivo <code class="filename">/var/yp/securenets</code>:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html
index dd7c954..00f12a9 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.5. Use autenticación con Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Asigne puertos estáticos y utilice reglas de iptables" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. Asegurando NFS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifram
 e id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.3.5. Use autenticación con Kerberos" id="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.3.5. Use autenticación 
 con Kerberos</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.5. Use autenticación con Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Asigne puertos estáticos y utilice reglas de iptables" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. Asegurando NFS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><i
 frame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.3.5. Use autenticación con Kerberos" id="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.3.5. Use autenticaci
 ón con Kerberos</h4></div></div></div><div class="para">
 				Uno de los problemas a ser considerados si se utiliza NIS para una autenticación, es que cada vez que un usuario ingresa en una máquina, se envía un hash del mapa <code class="filename">/etc/shadow</code> por la red. Si un intruso obtiene acceso a un dominio NIS y observa el tráfico en la red, puede recolectar los hashes de nombres de usuarios y contraseñas. Con el tiempo suficiente, un programa de descifrado de contraseñas puede adivinar aquellas que son débiles, y el atacante puede obtener acceso a una cuenta válida en esa red.
 			</div><div class="para">
 				Since Kerberos uses secret-key cryptography, no password hashes are ever sent over the network, making the system far more secure. Refer to <a class="xref" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos">Sección 2.6, “Kerberos”</a> for more information about Kerberos.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html
index 93ee8c7..42f8490 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.2. Utilización de nombres de dominio y de equipo NIS, de modo similar a una contraseña</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Editar el archivo /var/yp/securenets" /></head><body class="toc_embeded "><div id="toc
 div" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.3.2. Utilización de nombres de dominio y de equipo NIS, de modo similar a una contraseña" id="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname"><div class="titlepage"><div><di
 v keep-together.within-column="always"><h4 class="title">2.2.3.2. Utilización de nombres de dominio y de equipo NIS, de modo similar a una contraseña</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.2. Utilización de nombres de dominio y de equipo NIS, de modo similar a una contraseña</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Editar el archivo /var/yp/securenets" /></head><body class="toc_embeded "><div id=
 "tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.3.2. Utilización de nombres de dominio y de equipo NIS, de modo similar a una contraseña" id="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname"><div class="titlepage"><div
 ><div keep-together.within-column="always"><h4 class="title">2.2.3.2. Utilización de nombres de dominio y de equipo NIS, de modo similar a una contraseña</h4></div></div></div><div class="para">
 				Cualquier equipo dentro de un dominio NIS puede utilizar comandos para obtener información del servidor sin tener que autenticarse, siempre y cuando el usuario conozca tanto el nombre del equipo del servidor DNS y el nombre del dominio DNS.
 			</div><div class="para">
 				Por ejemplo, si alguien conecta una laptop en la red, o si irrumpe en ella desde el exterior (y se las ingenia para obtener una dirección IP interna), los siguientes comandos muestran el mapa de <code class="command">/etc/passwd</code>:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html
index d941df8..ba5a23a 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.2.2. Proteja portmap con iptables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Asegurando Portmap" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Asegurando Portmap" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">T
 his is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.2.2. Proteja portmap con iptables" id="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.2.2. Proteja portmap con iptables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.2.2. Proteja portmap con iptables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Asegurando Portmap" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Asegurando Portmap" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Asegurando NIS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.htm
 l">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.2.2. Proteja portmap con iptables" id="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.2.2. Proteja portmap con iptables</h4></div></div></div><div class="para">
 				Para restringir aún más el acceso al servicio <code class="command">portmap</code>, es una buena idea agregar reglas de iptables al servidor y restringir el acceso a redes específicas.
 			</div><div class="para">
 				Abajo hay dos ejemplos de comandos iptables. El primero permite conexiones TCP al puerto 111 (usado por el servicio <code class="command">portmap</code>) desde la red 192.168.0.0/24. El segundo permite conexiones TCP al mismo puerto localmente. Esto es necesario para el servicio <code class="command">sgi_fam</code> usado por <span class="application"><strong>Nautilus</strong></span>. Todos los demás paquetes son ignorados.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html
index 2bb6353..b4ac8c3 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7.3. Usuarios de sólo correo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Asegurando Sendmail" /><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS y Sendmail" /><link rel="next" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Verificar qué puertos están abiertos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfr
 ame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.7.3. Usuarios de sólo correo" id="sect-Security_Guide-Securing_Sendmail-Mail_only_Users"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.7.3. Usuarios de sólo correo</h4></div></div><
 /div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7.3. Usuarios de sólo correo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Asegurando Sendmail" /><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS y Sendmail" /><link rel="next" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Verificar qué puertos están abiertos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="t
 ocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.7.3. Usuarios de sólo correo" id="sect-Security_Guide-Securing_Sendmail-Mail_only_Users"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.7.3. Usuarios de sólo correo</h4></div></d
 iv></div><div class="para">
 				Para ayudar a prevenir que explote a los usuarios locales para usar el servidor Sendmail, lo mejor es que solamente ingresen al servidor Sendmail usando un cliente de correos electrónicos. Las cuentas de consola en el servidor de correo no deberían ser permitidas y todos los usuarios de consola en el archivo <code class="filename">/etc/passwd</code> deberían definirse como <code class="command">/sbin/nologin</code> (con la posible excepción del usuario root).
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Anterior</strong>2.2.7.2. NFS y Sendmail</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Siguiente</strong>2.2.8. Verificar qué puertos están abiertos</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html
index fe9a248..e273119 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7.2. NFS y Sendmail</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Asegurando Sendmail" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Asegurando Sendmail" /><link rel="next" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Usuarios de sólo correo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.
 html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.7.2. NFS y Sendmail" id="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.7.2. NFS y Sendmail</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7.2. NFS y Sendmail</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Asegurando Sendmail" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Asegurando Sendmail" /><link rel="next" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Usuarios de sólo correo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../
 toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.7.2. NFS y Sendmail" id="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.7.2. NFS y Sendmail</h4></div></div></div><div class="para">
 				Nunca coloque el directorio mail spool, <code class="filename">/var/spool/mail/</code>, en un volumen NFS compartido.
 			</div><div class="para">
 				Debido a que NFSv2 y NFSv3 no tienen control sobre usuarios ni IDs de grupos, dos o más usuarios pueden tener el mismo UID, y recibir y leer cada uno correos electrónicos del otro.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Security_Updates.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Security_Updates.html
index 3e7fc24..e49a2b4 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Security_Updates.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Security_Updates.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5. Actualizaciones de seguridad</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /><link rel="prev" href="sect-Security_Guide-Common_Exploits_and_Attacks.html" title="1.4. Ataques y debilidades comunes" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Verificación de paquetes firmados" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc
 " src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="1.5. Actualizaciones de seguridad" id="sect-Security_Guide-Security_Updates" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.5. Actualizaciones de seguridad</h2></div></div></div><div class="
 para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5. Actualizaciones de seguridad</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /><link rel="prev" href="sect-Security_Guide-Common_Exploits_and_Attacks.html" title="1.4. Ataques y debilidades comunes" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Verificación de paquetes firmados" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class=
 "toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="1.5. Actualizaciones de seguridad" id="sect-Security_Guide-Security_Updates" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.5. Actualizaciones de seguridad</h2></div></div></div><div cla
 ss="para">
 		A medida que las deficiencias en la seguridad se van descubriendo, el software involucrado debe ser actualizado, y limitar así cualquier tipo de potencial riesgo. Si el software es parte de un paquete contenido en la distribución Fedora entonces soportada, Fedora está comprometida a liberar lo antes posible las actualizaciones necesarias para solucionar las deficiencias del paquete en cuestión. A menudo, los anuncios sobre alguna imperfección en algún aspecto de la seguridad son acompañados de un parche (o código fuente que solucione el problema). Este parche es entonces aplicado al paquete de Fedora, probado y liberado como una actualización considerada de tipo errata. Sin embargo, si algún anuncio no incluye un parche, el desarrollador trabaja primero con el encargado del software para poder solucionar el problema. Una vez que el problema haya sido resuelto, el paquete es probado y liberado como una actualización de tipo errata.
 	</div><div class="para">
 		Si se lanza una errata de actualización del software de su sistema, es altamente recomendado actualizar los paquetes involucrados tan pronto como sea posible para minimizar la cantidad de tiempo en que el sistema es potencialmente vulnerable.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_FTP.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_FTP.html
index b5a6649..6ab0014 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_FTP.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_FTP.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6. Asegurando FTP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. Asegurando el servidor HTTP Apache" /><link rel="next" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Acceso anónimo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.htm
 l">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.6. Asegurando FTP" id="sect-Security_Guide-Server_Security-Securing_FTP"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.6. Asegurando FTP</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6. Asegurando FTP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. Asegurando el servidor HTTP Apache" /><link rel="next" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Acceso anónimo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc
 .html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.6. Asegurando FTP" id="sect-Security_Guide-Server_Security-Securing_FTP"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.6. Asegurando FTP</h3></div></div></div><div class="para">
 			El <em class="firstterm">Protocolo de Transferencia de Archivos</em> (<abbr class="abbrev">FTP</abbr>, por las iniciales en inglés de File Transfer Protocol), es un viejo protocolo TCP diseñado para transferir archivos sobre una red. Puesto que todas las transacciones con el servidor no son encriptadas, incluyendo las autenticaciones de usuario, es considerado un protocolo no seguro y debería ser configurado cuidadosamente.
 		</div><div class="para">
 			Fedora provee tres servidores FTP.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NFS.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NFS.html
index 165c40c..610b3e6 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NFS.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NFS.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4. Asegurando NFS</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Use autenticación con Kerberos" /><link rel="next" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Cuidado con los errores de sintaxis" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="
 ../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.4. Asegurando NFS" id="sect-Security_Guide-Server_Security-Securing_NFS"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.4. Asegurando NFS</h3></div></div></div><div class="important"><h2>Importante</h2><div class="p
 ara">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4. Asegurando NFS</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Use autenticación con Kerberos" /><link rel="next" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Cuidado con los errores de sintaxis" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" s
 rc="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.4. Asegurando NFS" id="sect-Security_Guide-Server_Security-Securing_NFS"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.4. Asegurando NFS</h3></div></div></div><div class="important"><h2>Importante</h2><div clas
 s="para">
 				The version of NFS included in Fedora, NFSv4, no longer requires the <code class="command">portmap</code> service as outlined in <a class="xref" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Asegurando Portmap">Sección 2.2.2, “Asegurando Portmap”</a>. NFS traffic now utilizes TCP in all versions, rather than UDP, and requires it when using NFSv4. NFSv4 now includes Kerberos user and group authentication, as part of the <code class="filename">RPCSEC_GSS</code> kernel module. Information on <code class="command">portmap</code> is still included, since Fedora supports NFSv2 and NFSv3, both of which utilize <code class="command">portmap</code>.
 			</div></div><div class="section" title="2.2.4.1. Planeamiento cuidadoso de la red" id="sect-Security_Guide-Securing_NFS-Carefully_Plan_the_Network"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.1. Planeamiento cuidadoso de la red</h4></div></div></div><div class="para">
 				Ahora que NFSv4 tiene la capacidad de enviar toda la información en la red encriptada utilizando Kerberos, es importante que el servicio sea configurado correctamente, si es que se encuentra detrás de un cortafuegos o en una red segmentada. Todavía NFSv3 envía los datos de manera no segura, y esto debería ser tendido en cuenta. Un diseño de redes que preste atención a todos estos aspectos puede prevenir fallas en la seguridad.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NIS.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NIS.html
index 3021f4f..e9863b0 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NIS.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NIS.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3. Asegurando NIS</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Proteja portmap con iptables" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Utilización de nombres de dominio y de equipo NIS, de modo similar a una contraseña" /></head><body class="toc_
 embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.3. Asegurando NIS" id="sect-Security_Guide-Server_Security-Securing_NIS"><div class="titlepage"><div><div keep-together.within-column="always"><h3 clas
 s="title">2.2.3. Asegurando NIS</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3. Asegurando NIS</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Proteja portmap con iptables" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Utilización de nombres de dominio y de equipo NIS, de modo similar a una contraseña" /></head><body class="
 toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.3. Asegurando NIS" id="sect-Security_Guide-Server_Security-Securing_NIS"><div class="titlepage"><div><div keep-together.within-column="always"><h3 
 class="title">2.2.3. Asegurando NIS</h3></div></div></div><div class="para">
 			El servicio de información de red (<em class="firstterm">Network Information Service</em>, <acronym class="acronym">NIS</acronym>) es un servicio RPC, llamado <code class="command">ypserv</code>, el cual es usado en conjunto con <code class="command">portmap</code> y otros servicios relacionados para distribuir mapas de nombres de usuario, contraseñas y otros tipos de información sensible dentro de su propio dominio.
 		</div><div class="para">
 			Un servidor NIS está compuesto por diversas aplicaciones. Entre ellas podemos encontrar:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Portmap.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Portmap.html
index d26e71e..927de75 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Portmap.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Portmap.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.2. Asegurando Portmap</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="next" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Proteja portmap con iptables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is a
 n iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.2. Asegurando Portmap" id="sect-Security_Guide-Server_Security-Securing_Portmap"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.2. Asegurando Portmap</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.2. Asegurando Portmap</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="next" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Proteja portmap con iptables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This 
 is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.2. Asegurando Portmap" id="sect-Security_Guide-Server_Security-Securing_Portmap"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.2. Asegurando Portmap</h3></div></div></div><div class="para">
 			El servicio <code class="command">portmap</code> es un demonio de asignación dinámica de puertos para servicios RPC como NIS y NFS. Tiene mecanismos débiles de autenticación y tiene la habilidad de asignar un amplio rango de puertos para los servicios que controla. Por estas razones, es difícil de asegurar.
 		</div><div class="note"><h2>Nota</h2><div class="para">
 				Asegurar <code class="command">portmap</code> solo afecta a las implementaciones NFSv2 y NFSv3, ya que desde NFSv4 ya no es requerido. Si usted planea implementar un servidor NFSv2 o NFSv3, entonces <code class="command">portmap</code> es requerido, y la siguiente sección aplica.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Sendmail.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Sendmail.html
index 9af8fe4..36cb34c 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Sendmail.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Sendmail.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7. Asegurando Sendmail</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Utilice encapsuladores TCP para el control de acceso" /><link rel="next" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS y Sendmail" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="
 toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.7. Asegurando Sendmail" id="sect-Security_Guide-Server_Security-Securing_Sendmail"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.7. Asegurando Sendmail</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7. Asegurando Sendmail</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Utilice encapsuladores TCP para el control de acceso" /><link rel="next" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS y Sendmail" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" cla
 ss="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.7. Asegurando Sendmail" id="sect-Security_Guide-Server_Security-Securing_Sendmail"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.7. Asegurando Sendmail</h3></div></div></div><div class="para">
 			Sendmail es un agente de transferencia de correos (MTA, por las iniciales en inglés de Mail Transfer Agent), que utiliza protocolo simple de transferencia de correo (SMTP, Simple Mail Transfer Protocol) para enviar mensajes electrónicos entre otros MTAs, o hacia otros clientes de correo, o agentes de entrega. Si bien muchos MTAs son capaces de encriptar el tráfico entre uno y otro, algunos no lo hacen, de modo que enviar correos electrónicos en una red pública es considerado una forma de comunicación no segura.
 		</div><div class="para">
 			Es recomendable que todos aquellos que estén planeando implementar un servidor Sendmail, tengan en cuenta los siguientes inconvenientes.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html
index 0010415..3b6e8b4 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.5. Asegurando el servidor HTTP Apache</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. Configuración del cortafuego de NFS" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. Asegurando FTP" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../.
 ./../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.5. Asegurando el servidor HTTP Apache" id="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.5. Asegurando el servidor HTTP Apache</h3></div></div></div><div class="
 para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.5. Asegurando el servidor HTTP Apache</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. Configuración del cortafuego de NFS" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. Asegurando FTP" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../
 ../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.5. Asegurando el servidor HTTP Apache" id="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.5. Asegurando el servidor HTTP Apache</h3></div></div></div><div cla
 ss="para">
 			El servidor HTTP Apache es uno de los servicios más seguros y estables que son empaquetados con Fedora. Una extensa variedad de opciones y técnicas están disponibles para asegurar el servidor HTTP Apache — demasiado numerosas para analizarlas en profundidad aquí. La sección siguiente explica brevemente algunas buenas costumbres al ejecutar el servidor HTTP Apache.
 		</div><div class="para">
 			Siempre verifique que funcione correctamente cualquier programa que tenga intención de utilizar en el sistema <span class="emphasis"><em>antes</em></span> de ponerlo en producción. Además, asegúrese que solo el usuario root tenga permisos de escritura sobre cualquier directorio que contenga programas o CGIs. Para hacer esto, ejecute los siguientes comandos como usuario root:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html
index c66bd9d..c19eebd 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.8. Verificar qué puertos están abiertos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Usuarios de sólo correo" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id
 ="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.8. Verificar qué puertos están abiertos" id="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.8. Verificar qué puertos están abiertos</h
 3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.8. Verificar qué puertos están abiertos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Usuarios de sólo correo" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifram
 e id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.2.8. Verificar qué puertos están abiertos" id="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.8. Verificar qué puertos están abierto
 s</h3></div></div></div><div class="para">
 			Luego de configurar los servicios de red, es importante prestarle atención a los puertos que actualmente están escuchando en las interfases de red del sistema. Cualquier puerto abierto puede ser la evidencia de una intrusión.
 		</div><div class="para">
 			Existen dos maneras fundamentales para listar los puertos que están abiertos en la red. La menos confiable consiste en consultar los paquetes en la red utilizando comandos como <code class="command">netstat -an</code> o <code class="command">lsof -i</code>. Este método es menos confiable debido a que estos programas no se conectan a la máquina desde la red, sino que verifican qué es lo que se está ejecutando en el sistema. Por esta razón, estas aplicaciones frecuentemente son reemplazadas por atacantes. Alguien que quiera ocultar el rastro que está dejando al ingresar, o al abrir sin autorización los puertos de un sistema, intentará reemplazar <code class="command">netstat</code> y <code class="command">lsof</code>, con sus versiones personales y modificadas.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security.html
index 4b3ce0e..242592f 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2. Seguridad del servidor</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Asegurando Portmap" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an ifra
 me, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.2. Seguridad del servidor" id="sect-Security_Guide-Server_Security" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.2. Seguridad del servidor</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2. Seguridad del servidor</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Asegurando Portmap" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an 
 iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.2. Seguridad del servidor" id="sect-Security_Guide-Server_Security" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.2. Seguridad del servidor</h2></div></div></div><div class="para">
 		Cuando un sistema es utilizado como servidor en una red pública, se convierte en el objetivo de los ataques. Por lo tanto, robustecer el sistema y desconectar los servicios es de importancia suprema para el administrador del sistema.
 	</div><div class="para">
 		Antes de profundizar en problemas específicos, recuerde los siguientes consejos generales para fortalecer la seguridad de los servidores:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html
index cf53446..3d3b8c8 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.5. Configurar Firefox para la utilización de Kerberos como SSO</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4. Cómo funciona el ingreso con tarjeta inteligente" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de autentica
 ción conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.3.5. Configurar Firefox para la utilización de Kerberos como 
 SSO" id="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.5. Configurar Firefox para la utilización de Kerberos como SSO</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.5. Configurar Firefox para la utilización de Kerberos como SSO</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4. Cómo funciona el ingreso con tarjeta inteligente" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Módulos de auten
 ticación conectables (PAM, por las iniciales en inglés de Pluggable Authentication Modules)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.3.5. Configurar Firefox para la utilización de Kerberos c
 omo SSO" id="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.5. Configurar Firefox para la utilización de Kerberos como SSO</h3></div></div></div><div class="para">
 			Puede configurar Firefox para utilizar Kerberos para la identificación única SSO. Para que esta herramienta pueda funcionar correctamente, necesita configurar su navegador web para que pueda enviar sus credenciales Kerberos al <abbr class="abbrev">KDC</abbr> adecuado. En la siguiente sección se describen las modificaciones a realizar en la configuración, y otros requerimientos necesarios para poder utilizar correctamente esta funcionalidad.
 		</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					En la barra de direcciones de Firefox, escriba <strong class="userinput"><code>about:config</code></strong> para ver una lista actualizada de las opciones de configuración disponibles.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html
index 8038855..098a394 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.2. Empezar a utilizar su nueva tarjeta inteligente</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Como funciona la ins
 cripción de las tarjetas inteligentes." /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.3.2. Empezar a utilizar su nueva tarjeta inteligente" id="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_ne
 w_Smart_Card"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.2. Empezar a utilizar su nueva tarjeta inteligente</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.2. Empezar a utilizar su nueva tarjeta inteligente</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Como funciona la
  inscripción de las tarjetas inteligentes." /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.3.2. Empezar a utilizar su nueva tarjeta inteligente" id="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_you
 r_new_Smart_Card"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.2. Empezar a utilizar su nueva tarjeta inteligente</h3></div></div></div><div class="para">
 			Antes de poder utilizar una tarjeta inteligente en sus sistema, y poder aprovechar las grandes ventajas en las opciones de seguridad que esta tecnología ofrece, necesita realizar en un determinado orden algunas instalaciones mínimas. Más abajo se explica en qué consisten.
 		</div><div class="note"><h2>Nota</h2><div class="para">
 				Esta sección ofrece una explicación general para poder empezar a utilizar su tarjeta inteligente. Información más específica puede encontrarse en la Guía del Cliente del Cliente de Seguridad Empresarial del Sistema de Certificado de Red Hat.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html
index 49f5e82..ba45d08 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Empezar a utilizar su nueva tarjeta inteligente" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4.
  Cómo funciona el ingreso con tarjeta inteligente" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.3.3. Como funciona la inscripción de las tarjetas inteligentes." id="sect-Sec
 urity_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Empezar a utilizar su nueva tarjeta inteligente" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.
 3.4. Cómo funciona el ingreso con tarjeta inteligente" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.3.3. Como funciona la inscripción de las tarjetas inteligentes." id="sect
 -Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.3. Como funciona la inscripción de las tarjetas inteligentes.</h3></div></div></div><div class="para">
 			Las tarjetas inteligentes se dice que son <em class="firstterm">inscriptas</em> cuando han recibido un certificado adecuado identificado con un Certificado de Autoridad válido (<abbr class="abbrev">CA</abbr>, por las iniciales en inglés de Certificate Authority). Esto implica una serie de pasos, que se describen a continuación:
 		</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					El usuario inserta su tarjeta inteligente en el lector de tarjetas de su estación de trabajo. Este evento es reconocido por el Cliente de Seguridad Corporativo (<abbr class="abbrev">ESC</abbr>, por las iniciales en inglés de Entreprise Security Client).
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html
index 30811de..0c55bc9 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.4. Cómo funciona el ingreso con tarjeta inteligente</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Como funciona la inscripción de las tarjetas inteligentes." /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" tit
 le="2.3.5. Configurar Firefox para la utilización de Kerberos como SSO" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.3.4. Cómo funciona el ingreso con tarjeta inteli
 gente" id="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.4. Cómo funciona el ingreso con tarjeta inteligente</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.4. Cómo funciona el ingreso con tarjeta inteligente</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Como funciona la inscripción de las tarjetas inteligentes." /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"
  title="2.3.5. Configurar Firefox para la utilización de Kerberos como SSO" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.3.4. Cómo funciona el ingreso con tarjeta in
 teligente" id="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.4. Cómo funciona el ingreso con tarjeta inteligente</h3></div></div></div><div class="para">
 			En la siguiente sección se ofrece una breve descripción general del proceso de registro utilizando una tarjeta inteligente.
 		</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					Cuando el usuario inserta su tarjeta inteligente en el lector de tarjetas, este evento es reconocido por la herramienta PAM, quien solicita al usuario su PIN.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO.html
index 8e0f2d5..9d4c819 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Verificar qué puertos están abiertos" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Empezar a utilizar su nueva tarjeta
  inteligente" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" id="sect-Sec
 urity_Guide-Single_Sign_on_SSO" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</h2></div></div></div><div class="section" title="2.3.1. Introducción" id="sect-Security_Guide-Single_Sign_on_SSO-Introduction"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.1. Introducción</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Verificar qué puertos están abiertos" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Empezar a utilizar su nueva tar
 jeta inteligente" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)" id="sect
 -Security_Guide-Single_Sign_on_SSO" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.3. Identificación única (SSO, por las iniciales en inglés de Single Sign-on)</h2></div></div></div><div class="section" title="2.3.1. Introducción" id="sect-Security_Guide-Single_Sign_on_SSO-Introduction"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.1. Introducción</h3></div></div></div><div class="para">
 			La funcionalidad de SSO de Fedora reduce el número de veces que los usuarios de escritorio de Fedora deben ingresar sus contraseñas. Varias de las aplicaciones más importantes utilizan los mismos mecanismos subyacentes de autenticación y autorización, de modo que los usuarios pueden identificarse desde la pantalla de registro en Fedora y luego no necesitar reingresar sus contraseñas. Estas aplicaciones se describen más abajo.
 		</div><div class="para">
 			Además, los usuarios pueden registrarse en sus máquinas aún cuando no exista una red (<em class="firstterm">modo desconexión</em>), o cuando la conectividad no sea confiable, como por ejemplo, los accesos inalámbricos. En este último caso, los servicios serán notablemente disminuidos.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html
index 33e2f3a..bb7d9f4 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.4. Instale paquetes identificados desde repositorios conocidos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Capítulo 6. Mantenimiento de Software" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Ajustando las actualizaciones automáticas" /><link rel="next" href="chap-Security_Guide-References.html" title="Capítulo 7. Referencias" /></head><body class="toc_embeded "><div
  id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-References.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="6.4. Instale paquetes identificados desde repositorios conocidos" id="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories"><div class="title
 page"><div><div keep-together.within-column="always"><h2 class="title">6.4. Instale paquetes identificados desde repositorios conocidos</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.4. Instale paquetes identificados desde repositorios conocidos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Capítulo 6. Mantenimiento de Software" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Ajustando las actualizaciones automáticas" /><link rel="next" href="chap-Security_Guide-References.html" title="Capítulo 7. Referencias" /></head><body class="toc_embeded ">
 <div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-References.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="6.4. Instale paquetes identificados desde repositorios conocidos" id="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories"><div class="t
 itlepage"><div><div keep-together.within-column="always"><h2 class="title">6.4. Instale paquetes identificados desde repositorios conocidos</h2></div></div></div><div class="para">
 			Los paquetes de software son publicados a través de repositorios. Todos los repositorios más conocidos tienen soporte para poder identificar sus paquetes. La identificación de los paquetes utiliza tecnología de llave pública para confirmar que un paquete publicado por un repositorio, no haya sido alterado desde que la identificación fue aplicada. Esto ofrece cierta protección para evitar instalar software que podría haber sido alterado maliciosamente luego de haber sido creado, pero antes que usted lo haya descargado.
 		</div><div class="para">
 			Si se utilizan demasiados repositorios, o que no sean confiables, o que alojen paquetes sin identificación, se corre un gran riesgo de introducción de códigos maliciosos o que pueden llegar a debilitar su sistema. Sea precavido al agregar repositorios para actualizar su sistema.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html
index e74f067..107b5fb 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.3. Ajustando las actualizaciones automáticas</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Capítulo 6. Mantenimiento de Software" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Planifique y configure actualizaciones de seguridad" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Instale paquetes identificados des
 de repositorios conocidos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="6.3. Ajustando las actualizaciones automáticas" id="sect-Security_Guide-Softwar
 e_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">6.3. Ajustando las actualizaciones automáticas</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.3. Ajustando las actualizaciones automáticas</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Capítulo 6. Mantenimiento de Software" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Planifique y configure actualizaciones de seguridad" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Instale paquetes identificados
  desde repositorios conocidos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="6.3. Ajustando las actualizaciones automáticas" id="sect-Security_Guide-Sof
 tware_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">6.3. Ajustando las actualizaciones automáticas</h2></div></div></div><div class="para">
 			Fedora is configured to apply all updates on a daily schedule. If you want to change the how your system installs updates you must do so via '''Software Update Preferences'''. You can change the schedule, the type of updates to apply or to notify you of available updates.
 		</div><div class="para">
 			In Gnome, you can find controls for your updates at: <code class="code">System -&gt; Preferences -&gt; System -&gt; Software Updates</code>. In KDE it is located at: <code class="code">Applications -&gt; Settings -&gt; Software Updates</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html
index 8f4adfc..6d4d5f7 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.2. Planifique y configure actualizaciones de seguridad</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Capítulo 6. Mantenimiento de Software" /><link rel="prev" href="chap-Security_Guide-Software_Maintenance.html" title="Capítulo 6. Mantenimiento de Software" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Ajustando las actualizaciones automáticas" /></head><body class="to
 c_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Software_Maintenance.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="6.2. Planifique y configure actualizaciones de seguridad" id="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates"><div class="titl
 epage"><div><div keep-together.within-column="always"><h2 class="title">6.2. Planifique y configure actualizaciones de seguridad</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.2. Planifique y configure actualizaciones de seguridad</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Capítulo 6. Mantenimiento de Software" /><link rel="prev" href="chap-Security_Guide-Software_Maintenance.html" title="Capítulo 6. Mantenimiento de Software" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Ajustando las actualizaciones automáticas" /></head><body class
 ="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Software_Maintenance.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="6.2. Planifique y configure actualizaciones de seguridad" id="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates"><div class="
 titlepage"><div><div keep-together.within-column="always"><h2 class="title">6.2. Planifique y configure actualizaciones de seguridad</h2></div></div></div><div class="para">
 			Todo software contiene errores. A menudo, estos errores pueden transformarse en una debilidad que podría dejar a su sistema expuesto a usuarios maliciosos. Sistemas no enmendados son una causa frecuente de intrusiones en las computadoras. Debería tener planificada la instalación de parches de seguridad en una forma sincronizada de manera tal de poder anular esas debilidades, y evitar así que sean aprovechadas.
 		</div><div class="para">
 			Para usuarios hogareños, las actualizaciones de seguridad deberían ser instaladas lo antes posible. Configurar instalaciones automáticas de ellas es una manera de evitar el tener que recordar constantemente hacerlo, pero podría traer aparejado el pequeño riesgo de que un determinado paquete entre en conflicto con la configuración de su sistema, o con otro software de su equipo.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html
index 96bbeae..f2fa07b 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2. Campos de opción</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Archivos de configuración de los encapsuladores TCP" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Archivos de configuración de los encapsuladores TCP" /><link rel="next" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Control de acceso" /></head><body 
 class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.2.2. Campos de opción" id="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields"><div class="titlepage"><div><div keep-together.within-column="alway
 s"><h4 class="title">2.5.2.2. Campos de opción</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2. Campos de opción</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Archivos de configuración de los encapsuladores TCP" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Archivos de configuración de los encapsuladores TCP" /><link rel="next" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Control de acceso" /></head><b
 ody class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.2.2. Campos de opción" id="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields"><div class="titlepage"><div><div keep-together.within-column="a
 lways"><h4 class="title">2.5.2.2. Campos de opción</h4></div></div></div><div class="para">
 				Además de las reglas básicas que permiten o que niegan el acceso, la implementación de encapsuladores TCP de Fedora soporta extensiones al lenguaje de control de acceso a través de <em class="firstterm">campos de opción</em>. Al utilizar los campos de opción en reglas de acceso de equipos, los administradores pueden realizar una variedad de tareas como por ejemplo modificar el comportamiento de los registros, consolidar control de acceso e iniciar comandos de terminal.
 			</div><div class="section" title="2.5.2.2.1. Registro" id="sect-Security_Guide-Option_Fields-Logging"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.1. Registro</h5></div></div></div><div class="para">
 					Los campos de opción permiten que los administradores modifiquen fácilmente la herramienta de registro y el nivel de prioridad para una regla, utilizando la directiva <code class="option">severity</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html
index 0fae937..5d8ac46 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5. Recursos adicionales</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" title="2.5.4.3.4. Opciones de administración de recursos" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Sitios web útiles relacionados con encapsuladores TCP" /></head><body class
 ="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.5. Recursos adicionales" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources"><div class="titlepage"><div><div keep-togethe
 r.within-column="always"><h3 class="title">2.5.5. Recursos adicionales</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5. Recursos adicionales</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" title="2.5.4.3.4. Opciones de administración de recursos" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Sitios web útiles relacionados con encapsuladores TCP" /></head><body c
 lass="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.5. Recursos adicionales" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources"><div class="titlepage"><div><div keep-tog
 ether.within-column="always"><h3 class="title">2.5.5. Recursos adicionales</h3></div></div></div><div class="para">
 			Mayor información acerca de los encapsuladores TCP y <code class="systemitem">xinetd</code> se encuentra disponible en Internet y en la documentación del sistema.
 		</div><div class="section" title="2.5.5.1. Documentación instalada acerca de los encapsuladores TCP" id="sect-Security_Guide-Additional_Resources-Installed_TCP_Wrappers_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.5.1. Documentación instalada acerca de los encapsuladores TCP</h4></div></div></div><div class="para">
 				La documentación de su sistema es un buen lugar en donde empezar a buscar opciones adicionales de configuración para los encapsuladores TCP, <code class="systemitem">xinetd</code>, y control de acceso.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html
index c96cb2c..dfa164b 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2. Archivos de configuración de los encapsuladores TCP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Campos de opción" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe"
  class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.2. Archivos de configuración de los encapsuladores TCP" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.2. Archivos de con
 figuración de los encapsuladores TCP</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2. Archivos de configuración de los encapsuladores TCP</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Campos de opción" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfr
 ame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.2. Archivos de configuración de los encapsuladores TCP" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.2. Archivos de
  configuración de los encapsuladores TCP</h3></div></div></div><div class="para">
 			Para determinar si a un cliente le es permitido conectarse a un servidor, los encapsuladores TCP consultan los dos archivos siguientes, comúnmente denominados archivos de <em class="firstterm">acceso de equipos</em>:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="filename">/etc/hosts.allow</code>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html
index a1432b0..cd577f0 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.3. xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Expansiones" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. Archivos de configuración de xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.
 html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.3. xinetd" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.3. xinetd</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.3. xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Expansiones" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. Archivos de configuración de xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../
 toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.3. xinetd" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.3. xinetd</h3></div></div></div><div class="para">
 			El demonio <code class="systemitem">xinetd</code> es un <em class="firstterm">súper servicio</em> encapsulado por TCP, que controla el acceso a un subconjunto de servicios de red muy utilizados, como por ejemplo FTP, IMAP y Telnet. También ofrece opciones de configuración de servicio específicas para control de acceso, registros mejorados, uniones, redirecciones y control de la utilización de los recursos.
 		</div><div class="para">
 			Cuando un cliente intenta conectarse a un servicio de red controlado por <code class="systemitem">xinetd</code>, el súper servicio recibe la petición y verifica la existencia de reglas de control de acceso para encapsuladores TCP.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html
index d8c2ec6..eb479e4 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4. Archivos de configuración de xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd" /><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. El directorio /etc/xinetd.d/" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc
 " src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4. Archivos de configuración de xinetd" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.4. Archivos de configuración de xinet
 d</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4. Archivos de configuración de xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. Encapsuladores TCP y xinetd" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd" /><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. El directorio /etc/xinetd.d/" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class=
 "toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4. Archivos de configuración de xinetd" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.4. Archivos de configuración de x
 inetd</h3></div></div></div><div class="para">
 			Los archivos de configuración para <code class="systemitem">xinetd</code> son los siguientes:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="filename">/etc/xinetd.conf</code> — El archivo de configuración general de <code class="filename">/etc/xinetd.conf</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd.html
index 076c963..3059afc 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5. Encapsuladores TCP y xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Sitios web útiles sobre PAM" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Archivos de configuración de los encapsuladores TCP" /></head><body class="toc_embeded "><div id="tocdiv"
  class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.5. Encapsuladores TCP y xinetd" id="sect-Security_Guide-TCP_Wrappers_and_xinetd" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class
 ="title">2.5. Encapsuladores TCP y xinetd</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5. Encapsuladores TCP y xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Sitios web útiles sobre PAM" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Archivos de configuración de los encapsuladores TCP" /></head><body class="toc_embeded "><div id="toc
 div" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.5. Encapsuladores TCP y xinetd" id="sect-Security_Guide-TCP_Wrappers_and_xinetd" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 c
 lass="title">2.5. Encapsuladores TCP y xinetd</h2></div></div></div><div class="para">
 		Controlling access to network services is one of the most important security tasks facing a server administrator. Fedora provides several tools for this purpose. For example, an <code class="command">iptables</code>-based firewall filters out unwelcome network packets within the kernel's network stack. For network services that utilize it, <em class="firstterm">TCP Wrappers</em> add an additional layer of protection by defining which hosts are or are not allowed to connect to "<span class="emphasis"><em>wrapped</em></span>" network services. One such wrapped network service is the <code class="systemitem">xinetd</code> <span class="emphasis"><em>super server</em></span>. This service is called a super server because it controls connections to a subset of network services and further refines access control.
 	</div><div class="para">
 		<a class="xref" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#figu-Security_Guide-TCP_Wrappers_and_xinetd-Access_Control_to_Network_Services" title="Figura 2.9. Control de acceso a servicios de red">Figura 2.9, “Control de acceso a servicios de red”</a> is a basic illustration of how these tools work together to protect network services.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html
index af55b94..0d33136 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html
@@ -1,9 +1,9 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.3. Administración desatendida</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Amenazas a la seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Servicios no parchados" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Servicios inseguros en sí mismos" /></head><body clas
 s="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.3.3. Administración desatendida" id="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration"><div class="titlepage"><div><div keep-
 together.within-column="always"><h4 class="title">1.3.3.3. Administración desatendida</h4></div></div></div><div class="para">
-				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<sup>[<a id="id1425627" href="#ftn.id1425627" class="footnote">10</a>]</sup> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.3. Administración desatendida</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Amenazas a la seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Servicios no parchados" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Servicios inseguros en sí mismos" /></head><body 
 class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.3.3. Administración desatendida" id="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration"><div class="titlepage"><div><div k
 eep-together.within-column="always"><h4 class="title">1.3.3.3. Administración desatendida</h4></div></div></div><div class="para">
+				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<sup>[<a id="id2623537" href="#ftn.id2623537" class="footnote">10</a>]</sup> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
 			</div><div class="para">
 				Alguno administradores no pueden enmendar sus servidores o estaciones de trabajo, y otros no le prestan atención a los mensajes de registro enviados desde el kernel del sistema, o generados por el tráfico en la red. Otro error común se produce al no modificar las contraseñas o claves establecidas por defecto para los servicios. Por ejemplo, algunas bases de datos tienen contraseñas administrativas generadas por defecto, debido a que los desarrolladores de las bases de datos presuponen que el administrador del sistema las modificará inmediatamente después de haberla instalado en su sistema. Si un administrador de una base de datos no cambia la contraseña, incluso un atacante sin demasiada experiencia puede utilizar una amplia gama de contraseñas que se sabe le pueden otorgar privilegios de administrador en esa base de datos. Estos son sólo algunos ejemplos que ilustran de qué manera una administración débil puede ocasionar la vulnerabilidad de los servidores.
-			</div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id1425627" href="#id1425627" class="para">10</a>] </sup>
+			</div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id2623537" href="#id2623537" class="para">10</a>] </sup>
 					http://www.sans.org/resources/errors.php
 				</p></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Anterior</strong>1.3.3.2. Servicios no parchados</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Siguiente</strong>1.3.3.4. Servicios inseguros en sí mismos</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html
index 1865272..519bf27 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.4. Servicios inseguros en sí mismos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Amenazas a la seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Administración desatendida" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Amenazas a las esta
 ciones de trabajo y seguridad en equipos hogareños" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.3.4. Servicios inseguros en sí mismos" id="sect-Secu
 rity_Guide-Threats_to_Server_Security-Inherently_Insecure_Services"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.3.4. Servicios inseguros en sí mismos</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.4. Servicios inseguros en sí mismos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Amenazas a la seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Administración desatendida" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Amenazas a las 
 estaciones de trabajo y seguridad en equipos hogareños" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.3.4. Servicios inseguros en sí mismos" id="sect-
 Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.3.4. Servicios inseguros en sí mismos</h4></div></div></div><div class="para">
 				Incluso la organización más precavida puede ser víctima de sus puntos débiles, si elige utilizar servicios de red inseguros. Por ejemplo, existen numerosos servicios desarrollados presuponiendo que serán utilizados en redes que se consideran confiables. Sin embargo, este presupuesto deja de funcionar ni bien el servicio se utiliza en Internet — que es considerada una red insegura.
 			</div><div class="para">
 				Una categoría de servicios de red no seguros son aquellos que en el momento de la autenticación, piden nombres de usuario y contraseñas que no estén encriptados. Telnet y FTP son dos ejemplos de este tipo de servicios. Si algún software diseñado para sustraer información se encuentre vigilando el tráfico entre el usuario remoto y un servicio con estas características, tanto los nombres de usuario como las contraseñas pueden ser interceptadas fácilmente.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html
index 2ba31bd..9030972 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.2. Servicios no parchados</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Amenazas a la seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Amenazas a la seguridad del servidor" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Administración desatendida" /></head>
 <body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.3.2. Servicios no parchados" id="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services"><div class="titlepage"><div><div
  keep-together.within-column="always"><h4 class="title">1.3.3.2. Servicios no parchados</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.2. Servicios no parchados</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Amenazas a la seguridad del servidor" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Amenazas a la seguridad del servidor" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Administración desatendida" /></h
 ead><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.3.2. Servicios no parchados" id="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services"><div class="titlepage"><div>
 <div keep-together.within-column="always"><h4 class="title">1.3.3.2. Servicios no parchados</h4></div></div></div><div class="para">
 				La mayoría de las aplicaciones de servidor que se incluyen en una instalación por defecto son piezas de software sólidas y completamente comprobadas. Habiendo sido utilizadas en entornos de producción durante muchos años, el código de ellas ha sido totalmente refinado y muchos de sus errores han sido encontrados y corregidos.
 			</div><div class="para">
 				Sin embargo, no existe algo así como el software perfecto y existe siempre un margen para futuras mejoras. Es más, por lo general el software más reciente no ha sido probado con el rigor que uno podría esperar, debido a su reciente aparición en los entornos de producción, o debido a que no es tan popular como otros.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html
index c0200e6..695d4e2 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.4.2. Aplicaciones de tipo cliente vulnerables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños" /><link rel="next" href="sect-Security_
 Guide-Common_Exploits_and_Attacks.html" title="1.4. Ataques y debilidades comunes" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.4.2. Aplicaciones de tipo cliente vulnerables" id
 ="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.4.2. Aplicaciones de tipo cliente vulnerables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.4.2. Aplicaciones de tipo cliente vulnerables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Amenazas a las estaciones de trabajo y seguridad en equipos hogareños" /><link rel="next" href="sect-Secur
 ity_Guide-Common_Exploits_and_Attacks.html" title="1.4. Ataques y debilidades comunes" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.3.4.2. Aplicaciones de tipo cliente vulnerables
 " id="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.4.2. Aplicaciones de tipo cliente vulnerables</h4></div></div></div><div class="para">
 				Si bien un administrador puede tener un servidor completamente seguro y enmendado, esto no significa que los usuarios remotos se encuentren a salvo en el momento de acceder a él. Por ejemplo, si el servidor ofrece servicios Telnet o FTP sobre una red pública, un atacante puede capturar los nombres de usuario y contraseñas que son enviados a través de la red con un formato de texto simple, y luego utilizar la información de la cuenta para poder ingresar en la estación de trabajo del usuario remoto.
 			</div><div class="para">
 				Aún cuando se utilicen protocolos seguros, como SSH, un usuario remoto puede ser vulnerable a ciertos ataques si no mantiene actualizadas sus aplicaciones de cliente. Por ejemplo, los clientes de SSH v.1 son vulnerables a un ataque de reenvío de X que provenga de servidores maliciosos. Una vez conectado al servidor, el atacante puede capturar silenciosamente cualquier presión de teclas o pulsación del ratón que el cliente haya hecho sobre la red. Este problema fue solucionado con el protocolo SSH v.2, pero queda en manos del usuario conocer qué aplicaciones tienen puntos débiles, y actualizarlas cuando sea necesario.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Applying_the_Changes.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Applying_the_Changes.html
index db9a19f..8be2c19 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Applying_the_Changes.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Applying_the_Changes.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.4. Aplicación de los cambios</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Instalación de paquetes firmados" /><link rel="next" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../
 ../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.5.4. Aplicación de los cambios" id="sect-Security_Guide-Updating_Packages-Applying_the_Changes"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.4. Aplicación de los cambios</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.4. Aplicación de los cambios</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Instalación de paquetes firmados" /><link rel="next" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="..
 /../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.5.4. Aplicación de los cambios" id="sect-Security_Guide-Updating_Packages-Applying_the_Changes"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.4. Aplicación de los cambios</h3></div></div></div><div class="para">
 			Después de descargar e instalar las erratas de seguridad y actualizaciones, es importante dejar de usar el software viejo y comenzar a usar el nuevo. Cómo se hace esto depende del tipo de software que se haya actualizado. La siguiente lista muestran los items de la categoría general de software y provee instrucciones para usar las versiones actualizadas después de cada actualización de paquetes.
 		</div><div class="note"><h2>Nota</h2><div class="para">
 				En general, reiniciar el sistema es la mejor forma de asegurarse que la última versión de un paquete de software esté en uso; sin embargo, esta opción no es siempre necesaria, o está disponible sólo para el administrador del sistema.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html
index 53d33d6..0b1ee15 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.3. Instalación de paquetes firmados</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Verificación de paquetes firmados" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. Aplicación de los cambios" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfra
 me" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.5.3. Instalación de paquetes firmados" id="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.3. Instalación de paquetes firmad
 os</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.3. Instalación de paquetes firmados</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Verificación de paquetes firmados" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. Aplicación de los cambios" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="to
 cframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.5.3. Instalación de paquetes firmados" id="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.3. Instalación de paquetes fi
 rmados</h3></div></div></div><div class="para">
 			La instalación de la mayoría de los paquetes se puede hacer en forma segura (excepto para los paquetes del kernel) emitiendo el siguiente comando:
 		</div><pre class="screen"><code class="command">rpm -Uvh /tmp/updates/*.rpm</code>
 </pre><div class="para">
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html
index ed0007c..0d4aa7d 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.2. Verificación de paquetes firmados</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad" /><link rel="prev" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Instalación de paquetes firmados" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="
 ../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Security_Updates.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.5.2. Verificación de paquetes firmados" id="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.2. Verificación de paquetes firmados</h3></div></div></div><div class="para
 ">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.2. Verificación de paquetes firmados</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad" /><link rel="prev" href="sect-Security_Guide-Security_Updates.html" title="1.5. Actualizaciones de seguridad" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Instalación de paquetes firmados" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" s
 rc="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Security_Updates.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.5.2. Verificación de paquetes firmados" id="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.2. Verificación de paquetes firmados</h3></div></div></div><div class="
 para">
 			Todos los paquetes de Fedora están firmados con la clave <em class="firstterm">GPG</em> de Fedora. GPG viene de GNU Privacy Guard (guardia de la privacidad de GNU), o GnuPG, un paquete de software libre que se usa para asegurar la autenticidad de archivos a distribuir. Por ejemplo, una clave privada (clave secreta) bloquea el paquete mientras que la clave pública desbloquea y verifica el paquete. Si la clave pública distribuida por Fedora no coincide con la clave privada durante la verificación del RPM, el paquete puede haber sido alterado y por lo tanto no es confiable.
 		</div><div class="para">
 			La utilidad RPM de Fedora intenta verificar automáticamente la firma GPG de un paquete RPM antes de instalarlo. Si la clave GPG no está instalada, se debe instalar desde una ubicación estática y segura, como el CD-ROM o DVD de instalación de Fedora.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html
index 7616b18..2709ee9 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3.2. Políticas básicas del cortafuego</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. Uso de IPTables" /><link rel="prev" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. Uso de IPTables" /><link rel="next" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Guardando y restaurando las reglas de IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" 
 class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.3.2. Políticas básicas del cortafuego" id="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.3.2. Políticas básicas del cortafuego</h4></di
 v></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3.2. Políticas básicas del cortafuego</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. Uso de IPTables" /><link rel="prev" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. Uso de IPTables" /><link rel="next" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Guardando y restaurando las reglas de IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfra
 me" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.3.2. Políticas básicas del cortafuego" id="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.3.2. Políticas básicas del cortafuego</h4>
 </div></div></div><div class="para">
 				El establecimiento de políticas básicas de cortafuego crea la base para construir reglas más detalladas definidas por el usuario.
 			</div><div class="para">
 				Cada cadena de <code class="command">iptables</code> se compone de una política predeterminada, y cero o más reglas que funcionan en conjunto con la política predeterminada para definir el conjunto de reglas del cortafuego.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html
index 2f30bf7..085c688 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3.3. Guardando y restaurando las reglas de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. Uso de IPTables" /><link rel="prev" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Políticas básicas del cortafuego" /><link rel="next" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Filtrado común de IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id=
 "tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.3.3. Guardando y restaurando las reglas de IPTables" id="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.3.3. Guardando
  y restaurando las reglas de IPTables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3.3. Guardando y restaurando las reglas de IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. Uso de IPTables" /><link rel="prev" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Políticas básicas del cortafuego" /><link rel="next" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Filtrado común de IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe
  id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.8.3.3. Guardando y restaurando las reglas de IPTables" id="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.3.3. Guard
 ando y restaurando las reglas de IPTables</h4></div></div></div><div class="para">
 				Los cambios en <code class="command">iptables</code> son transitorios; si el sistema es reiniciado o si el servicio de <code class="command">iptables</code> es reiniciado, las reglas son automáticamente eliminadas y reiniciadas. Para guardar las reglas de modo que sean cargadas cuando el servicio <code class="command">iptables</code> sea iniciado, utilice el siguiente comando:
 			</div><pre class="screen">[root at miServidor ~ ] # service iptables save
 </pre><div class="para">
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html
index 0d8af55..91e5fa4 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.4. Creando una conexión IPsec</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. Instalación de IPsec" /></head><body class="toc_embeded "><div id="to
 cdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.4. Creando una conexión IPsec" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class=
 "title">2.7.4. Creando una conexión <abbr class="abbrev">IPsec</abbr></h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.4. Creando una conexión IPsec</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. Instalación de IPsec" /></head><body class="toc_embeded "><div id
 ="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.4. Creando una conexión IPsec" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection"><div class="titlepage"><div><div keep-together.within-column="always"><h3 cl
 ass="title">2.7.4. Creando una conexión <abbr class="abbrev">IPsec</abbr></h3></div></div></div><div class="para">
 			Una conexión <abbr class="abbrev">IPsec</abbr> está separada en dos etapas lógicas. En la primera etapa, un nodo <abbr class="abbrev">IPsec</abbr> inicia la conexión con el nodo remoto o la red. El nodo remoto o la red verifica las credenciales del nodo que hace la petición y ambas partes establecen un método de autenticación para la conexión.
 		</div><div class="para">
 			En sistemas Fedora, una conexión <abbr class="abbrev">IPsec</abbr> utiliza un método de <em class="firstterm">clave pre-compartida</em> para la autenticación del nodo <abbr class="abbrev">IPsec</abbr>. En una conexión <abbr class="abbrev">IPsec</abbr> de este tipo, ambos equipos deben utilizar la misma clave para poder avanzar hacia la segunda etapa de la conexión <abbr class="abbrev">IPsec</abbr>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html
index 22b58b9..82d210a 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.3. IPsec</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPNs y Fedora" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Creando una conexión IPsec" /></head><body class="toc_embeded "><
 div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.3. IPsec" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.3. IP
 sec</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.3. IPsec</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPNs y Fedora" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Creando una conexión IPsec" /></head><body class="toc_embeded
  "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.3. IPsec" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.3
 . IPsec</h3></div></div></div><div class="para">
 			Fedora ofrece soporte de <abbr class="abbrev">IPsec</abbr> para conectar equipos remotos y redes entre sí, utilizando un túnel seguro en un medio de transporte de red común, como lo es Internet. <abbr class="abbrev">IPsec</abbr> puede ser implementado utilizando una configuración de tipo equipo-a-equipo (una estación de trabajo con otra), o de tipo red-a-red (una <acronym class="acronym">LAN</acronym>/<acronym class="acronym">WAN</acronym> con otra).
 		</div><div class="para">
 			La utilización de <abbr class="abbrev">IPsec</abbr> en Fedora utiliza <em class="firstterm">Intercambio de Clave de Internet</em> (<em class="firstterm">IKE</em>, por las iniciales en inglés de Internet Key Exchange), un protocolo implementado por el Equipo de Tareas de Ingeniería de Internet (<acronym class="acronym">IETF</acronym>, por las iniciales en inglés de Internet Engineering Task Force), utilizado para autenticación mutua y asociaciones seguras entre sistemas conectados.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html
index cd360eb..bc240b2 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.6. Configuración de IPsec equipo-a-equipo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. Instalación de IPsec" /><link rel="next" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Con
 figuración manual de una conexión IPsec de tipo equipo-a-equipo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.6. Configuración de IPsec equipo-a-equipo" i
 d="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.6. Configuración de IPsec equipo-a-equipo</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.6. Configuración de IPsec equipo-a-equipo</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. Instalación de IPsec" /><link rel="next" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2.
  Configuración manual de una conexión IPsec de tipo equipo-a-equipo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.6. Configuración de IPsec equipo-a-equip
 o" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.6. Configuración de IPsec equipo-a-equipo</h3></div></div></div><div class="para">
 			IPsec puede configurarse para conectar un equipo de escritorio o estación de trabajo con otro mediante una conexión de tipo equipo-a-equipo. Este tipo de conexión utiliza la red a la que cada uno de los equipos se conecta para crear un túnel seguro entre cada equipo. Los requerimientos de una conexión de equipo-a-equipo son mínimos, al igual que la configuración de <abbr class="abbrev">IPsec</abbr>. El equipo necesita solo una conexión dedicada a una red que haga de medio de transporte (como lo es Internet) y Fedora para crear la conexión <abbr class="abbrev">IPsec</abbr>.
 		</div><div class="section" title="2.7.6.1. Conexión equipo-a-equipo" id="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Host_to_Host_Connection"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.7.6.1. Conexión equipo-a-equipo</h4></div></div></div><div class="para">
 				Una conexión de tipo equipo-a-equipo es una conexión encriptada entre dos sistemas, ambos utilizando <abbr class="abbrev">IPsec</abbr> con la misma clave de autenticación. Con la conexión <abbr class="abbrev">IPsec</abbr> activa, cualquier tráfico de red entre los dos equipos es encriptada.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html
index f08b986..7957a16 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.5. Instalación de IPsec</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Creando una conexión IPsec" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. Configuración de
  IPsec equipo-a-equipo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.5. Instalación de IPsec" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_In
 stallation"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.5. Instalación de IPsec</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.5. Instalación de IPsec</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Creando una conexión IPsec" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. Configuració
 n de IPsec equipo-a-equipo" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.5. Instalación de IPsec" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPse
 c_Installation"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.5. Instalación de IPsec</h3></div></div></div><div class="para">
 			La implementación de <abbr class="abbrev">IPsec</abbr> necesita tener instalado el paquete RPM <code class="filename">ipsec-tools</code> en todos los equipos <abbr class="abbrev">IPsec</abbr> (si es que se está utilizando una configuración de tipo equipo-a-equipo), o enrutadores (si es es que se está utilizando una configuración de tipo red-a-red). El paquete RPM contiene bibliotecas esenciales, demonios, y archivos de configuración para establecer la conexión <abbr class="abbrev">IPsec</abbr>, como por ejemplo:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="command">/sbin/setkey</code> — manipula la administración de clave y los atributos de seguridad para <abbr class="abbrev">IPsec</abbr> en el kernel. Este ejecutable es controlado por el demonio de administración de clave <code class="command">racoon</code>. Para obtener mayor información, consulte la página man número 8 de <code class="command">setkey</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html
index 70dd91f..438ac3f 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.7. Configuración IPsec red-a-red</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Configuración manual de una conexión IPsec de tipo equipo-a-equipo" /><link rel="next" href="sect-Security_Guide-IPsec_Network_to_Network_Configura
 tion-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2. Configuración manual de una conexión IPsec de tipo red-a-red." /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Si
 guiente</strong></a></li></ul><div class="section" title="2.7.7. Configuración IPsec red-a-red" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.7. Configuración IPsec red-a-red</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.7. Configuración IPsec red-a-red</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Configuración manual de una conexión IPsec de tipo equipo-a-equipo" /><link rel="next" href="sect-Security_Guide-IPsec_Network_to_Network_Confi
 guration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2. Configuración manual de una conexión IPsec de tipo red-a-red." /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><stron
 g>Siguiente</strong></a></li></ul><div class="section" title="2.7.7. Configuración IPsec red-a-red" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.7. Configuración IPsec red-a-red</h3></div></div></div><div class="para">
 			IPsec can also be configured to connect an entire network (such as a <acronym class="acronym">LAN</acronym> or <acronym class="acronym">WAN</acronym>) to a remote network using a network-to-network connection. A network-to-network connection requires the setup of <abbr class="abbrev">IPsec</abbr> routers on each side of the connecting networks to transparently process and route information from one node on a <acronym class="acronym">LAN</acronym> to a node on a remote <acronym class="acronym">LAN</acronym>. <a class="xref" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html#figu-Security_Guide-IPsec_Network_to_Network_Configuration-A_network_to_network_IPsec_tunneled_connection" title="Figura 2.11. A network-to-network IPsec tunneled connection">Figura 2.11, “A network-to-network <abbr class="abbrev">IPsec</abbr> tunneled connection”</a> shows a network-to-network <abbr class="abbrev">IPsec</abbr> tunneled connection.
 		</div><div class="figure" title="Figura 2.11. A network-to-network IPsec tunneled connection" id="figu-Security_Guide-IPsec_Network_to_Network_Configuration-A_network_to_network_IPsec_tunneled_connection"><div class="figure-contents"><div class="mediaobject"><img src="images/n-t-n-ipsec-diagram.png" width="444" alt="A network-to-network IPsec tunneled connection" /><div class="longdesc"><div class="para">
 						A network-to-network <abbr class="abbrev">IPsec</abbr> tunneled connection
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html
index 059fd3e..d12ac7c 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.8. Iniciar y detener una conexión IPsec</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2. Configuración manual de una conexión IPsec de tipo red-a-red." /><link rel="next" href="sect-Security_Guide-Firewalls.html" titl
 e="2.8. Cortafuegos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.8. Iniciar y detener una conexión IPsec" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_
 an_IPsec_Connection"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.8. Iniciar y detener una conexión <abbr class="abbrev">IPsec</abbr></h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.8. Iniciar y detener una conexión IPsec</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2. Configuración manual de una conexión IPsec de tipo red-a-red." /><link rel="next" href="sect-Security_Guide-Firewalls.html" 
 title="2.8. Cortafuegos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.8. Iniciar y detener una conexión IPsec" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopp
 ing_an_IPsec_Connection"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.8. Iniciar y detener una conexión <abbr class="abbrev">IPsec</abbr></h3></div></div></div><div class="para">
 			Si la conexión <abbr class="abbrev">IPsec</abbr> no fue configurada para activarse durante el arranque del equipo, puede controlarla desde la línea de comandos.
 		</div><div class="para">
 			Para iniciar la conexión, utilice el siguiente comando en cada uno de los equipos para una IPsec de tipo equipo-a-equipo, o en cada uno de los enrutadores <abbr class="abbrev">IPsec</abbr> para una IPsec de tipo red-a-red:
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html
index 0415d93..4bf3843 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.2. VPNs y Fedora</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec" /></head><body
  class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.2. VPNs y Fedora" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.2. 
 VPNs y Fedora</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.2. VPNs y Fedora</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec" /></head><
 body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.7.2. VPNs y Fedora" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7
 .2. VPNs y Fedora</h3></div></div></div><div class="para">
 			Fedora ofrece varias opciones en términos de implementar herramientas de software para conectarse de manera segura en una <acronym class="acronym">WAN</acronym>. La utilización de <em class="firstterm">Protocolos de Seguridad de Internet</em> (<acronym class="acronym">IPsec</acronym>), es la herramienta <abbr class="abbrev">VPN</abbr> para Fedora, y cubre adecuadamente las necesidades de las organizaciones que posean oficinas sucursales, o usuarios remotos
 		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Anterior</strong>2.7. Redes privadas virtuales (VPNs, por las inic...</a></li><li class="up"><a accesskey="u" href="#"><strong>Subir</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Inicio</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Siguiente</strong>2.7.3. IPsec</a></li></ul></body></html>
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs.html
index c6fd1f2..cef7a3c 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Páginas web útiles sobre Kerberos" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPNs y Fedora" /></head><body class="toc_emb
 eded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" id="sect-Security_Guide-Virtual_Private_Networks_VPNs" lang="es-
 ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Capítulo 2. Asegurando su Red" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Páginas web útiles sobre Kerberos" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPNs y Fedora" /></head><body class="toc
 _embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)" id="sect-Security_Guide-Virtual_Private_Networks_VPNs" lang=
 "es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.7. Redes privadas virtuales (VPNs, por las iniciales en inglés de Virtual Private Networks)</h2></div></div></div><div class="para">
 		Las organizaciones con diferentes oficinas satélites, a menudo se conectan entre ellas mediante líneas constituidas específicamente para proteger los datos vitales y asegurar la eficacia en su transferencia. Por ejemplo, muchos comercios utilizan líneas de frame relay o <em class="firstterm">Modo de Transferencia no Sincronizada</em> (<acronym class="acronym">ATM</acronym>, por las iniciales en inglés de Asynchronous Transfer Mode) como una herramienta de comunicaciones de tipo punto-a-punto para enlazar una oficina con el resto. Este puede llegar a ser un recurso algo costoso, especialmente para pequeñas o medianas empresas, que quieren expandirse sin tener que pagar los altos costos que involucra la utilización de circuitos digitales a medida, generalmente utilizados por empresas de mayor poder adquisitivo.
 	</div><div class="para">
 		Para poder cubrir estas necesidades, se han desarrollado las <em class="firstterm">Redes Privadas Virtuales</em> (<abbr class="abbrev">VPN</abbr>s). Utilizando los mismos principios de funcionamiento que los circuitos a medida, las <abbr class="abbrev">VPN</abbr>s permiten comunicaciones digitales seguras entre dos elementos (o redes), creando una <em class="firstterm">Red de Area Global</em> (<acronym class="acronym">WAN</acronym>, por las iniciales en inglés de Wide Area Network) a partir de <em class="firstterm">Redes de Area Local</em> (<acronym class="acronym">LAN</acronym>s, Local Area Networks) existentes. La diferencia entre frame relay o ATM reside en el medio de transporte que se utiliza. Las <abbr class="abbrev">VPN</abbr>s transmiten sobre IP mediante la utilización de datagramas como su medio de transporte, convirtiéndolas en un conducto seguro a través de Internet hacia un destino específico. La mayoría de las implementaciones <abbr class="abbrev">VPN</
 abbr> de software libre incorporan estándares abiertos de métodos de encriptación para, posteriormente, enmascarar los datos en tránsito.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html
index fbab1e1..2feb129 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.2. Definiendo evaluación y pruebas</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Evaluación de debilidades" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Evaluación de debilidades" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" 
 src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.2. Definiendo evaluación y pruebas" id="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.2.2. Definiendo evaluación y pruebas</h3></div></div
 ></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.2. Definiendo evaluación y pruebas</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Evaluación de debilidades" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Evaluación de debilidades" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Herramientas de evaluación" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="t
 oc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.2. Definiendo evaluación y pruebas" id="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.2.2. Definiendo evaluación y pruebas</h3></div><
 /div></div><div class="para">
 			Las evaluaciones de debilidades pueden ser catalogadas en dos grandes tipos: <em class="firstterm">De afuera hacia adentro</em> y <em class="firstterm">de adentro hacia afuera</em>.
 		</div><div class="para">
 			When performing an outside looking in vulnerability assessment, you are attempting to compromise your systems from the outside. Being external to your company provides you with the cracker's viewpoint. You see what a cracker sees — publicly-routable IP addresses, systems on your <em class="firstterm">DMZ</em>, external interfaces of your firewall, and more. DMZ stands for "demilitarized zone", which corresponds to a computer or small subnetwork that sits between a trusted internal network, such as a corporate private LAN, and an untrusted external network, such as the public Internet. Typically, the DMZ contains devices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers, SMTP (e-mail) servers and DNS servers.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html
index 8118bfb..02b5a12 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3. Herramientas de evaluación</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Evaluación de debilidades" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Definiendo evaluación y pruebas" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" sr
 c="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.3. Herramientas de evaluación" id="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.2.3. Herramientas de evaluación</h3></div></div></div><d
 iv class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3. Herramientas de evaluación</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Evaluación de debilidades" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Definiendo evaluación y pruebas" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc
 " src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="1.2.3. Herramientas de evaluación" id="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.2.3. Herramientas de evaluación</h3></div></div></di
 v><div class="para">
 			Una evaluación puede iniciarse utilizando algún tipo de herramienta que permita reunir información. Cuando se acceda a la totalidad de la red, primero haga un mapeo del diagrama para encontrar los equipos que se encuentren en ejecución. Una vez localizados, examine a cada uno de ellos de manera individual. Para concentrarse en estos equipos se necesita otro conjunto de herramientas. Conocer qué herramientas utilizar puede ser la etapa más importante del proceso para poder encontrar debilidades.
 		</div><div class="para">
 			Al igual que con cualquier aspecto de nuestra vida cotidiana, existen numerosas herramientas diferentes que son capaces de realizar el mismo trabajo. Este concepto también se aplica a la realización de evaluaciones de debilidades. Existen herramientas específicas para los sistemas operativos, para las aplicaciones, incluso para las redes (de acuerdo a los protocolos utilizados). Algunas herramientas son gratuitas, otras no. Algunas herramientas son intuitivas y sencillas de utilizar, mientras que otras son crípticas y poco documentadas, pero que tienen capacidades que otras no poseen.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment.html
index 7bc375f..1e07a1e 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2. Evaluación de debilidades</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /><link rel="prev" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Definiendo evaluación y pruebas" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc
 " src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Security_Overview.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="1.2. Evaluación de debilidades" id="sect-Security_Guide-Vulnerability_Assessment" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.2. Evaluación de debilidades</h2></div></div></div><div 
 class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2. Evaluación de debilidades</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /><link rel="prev" href="chap-Security_Guide-Security_Overview.html" title="Capítulo 1. Repaso sobre seguridad" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Definiendo evaluación y pruebas" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class=
 "toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Security_Overview.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Siguiente</strong></a></li></ul><div xml:lang="es-ES" class="section" title="1.2. Evaluación de debilidades" id="sect-Security_Guide-Vulnerability_Assessment" lang="es-ES"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.2. Evaluación de debilidades</h2></div></div></div><
 div class="para">
 		Dependiendo del tiempo, de los recursos y de la motivación, un atacante puede ingresar prácticamente en cualquier sistema. En términos absolutos, ninguna tecnología o proceso en seguridad actualmente disponible, puede garantizar que un sistema determinado sea completamente invulnerable. Los enrutadores contribuyen a la seguridad de las puertas de enlace frente a Internet. Los cortafuegos contribuyen a la seguridad de las redes internas. Las redes virtuales privadas envían datos en forma segura mediante un flujo encriptado. Sistemas para la detección de extraños le avisan en caso de encontrar actividad malintencionada. Sin embargo, el éxito de cada una de estas tecnologías depende de una numerosa cantidad de variables, entre las cuales podemos encontrar:
 	</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 				La experiencia del equipo responsable de la configuración, monitoreo y manutención de esas tecnologías.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html
index 99285df..e891dd6 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3. Alteración de los archivos de configuración de xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. Archivos de configuración de xinetd" /><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. El directorio /etc/xinetd.d/" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Opciones para 
 el control de acceso" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4.3. Alteración de los archivos de configuración de xinetd" id="sect-Security_Guide-xinetd_Configu
 ration_Files-Altering_xinetd_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.4.3. Alteración de los archivos de configuración de xinetd</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3. Alteración de los archivos de configuración de xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. Archivos de configuración de xinetd" /><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. El directorio /etc/xinetd.d/" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Opciones p
 ara el control de acceso" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4.3. Alteración de los archivos de configuración de xinetd" id="sect-Security_Guide-xinetd_Con
 figuration_Files-Altering_xinetd_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.4.3. Alteración de los archivos de configuración de xinetd</h4></div></div></div><div class="para">
 				Existen disponibles una variedad de directivas protegidas por <code class="systemitem">xinetd</code>. En esta sección se detallan algunas de las opciones más comunmente utilizadas.
 			</div><div class="section" title="2.5.4.3.1. Opciones para registrado" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Logging_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.1. Opciones para registrado</h5></div></div></div><div class="para">
 					Las siguientes opciones de registro se encuentran disponibles tanto para <code class="filename">/etc/xinetd.conf</code> como para los archivos de configuración del servicio específico en el directorio <code class="filename">/etc/xinetd.d/</code>.
diff --git a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html
index bb186ba..d57e3ff 100644
--- a/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html
+++ b/public_html/es-ES/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.2. El directorio /etc/xinetd.d/</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. Archivos de configuración de xinetd" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. Archivos de configuración de xinetd" /><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. Alteración de los archivos de conf
 iguración de xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4.2. El directorio /etc/xinetd.d/" id="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinet
 d.d_Directory"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.4.2. El directorio /etc/xinetd.d/</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.2. El directorio /etc/xinetd.d/</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-es-ES-1.0-19" /><link rel="home" href="index.html" title="Guía de Seguridad" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. Archivos de configuración de xinetd" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. Archivos de configuración de xinetd" /><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. Alteración de los archivos de 
 configuración de xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Anterior</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Siguiente</strong></a></li></ul><div class="section" title="2.5.4.2. El directorio /etc/xinetd.d/" id="sect-Security_Guide-xinetd_Configuration_Files-The_etcx
 inetd.d_Directory"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.4.2. El directorio /etc/xinetd.d/</h4></div></div></div><div class="para">
 				El directorio <code class="filename">/etc/xinetd.d/</code> contiene los archivos de configuración para cada servicio administrado por <code class="systemitem">xinetd</code>, y los nombres de los archivos correspondientes al servicio. Del mismo modo que con <code class="filename">xinetd.conf</code>, este directorio es de solo lectura cuando el servicio <code class="systemitem">xinetd</code> es iniciado. Para que cualquier cambio pueda tener efecto, el administrador debe reiniciar el servicio <code class="systemitem">xinetd</code>.
 			</div><div class="para">
 				El formato de los archivos en el directorio <code class="filename">/etc/xinetd.d/</code> utiliza las mismas convenciones que <code class="filename">/etc/xinetd.conf</code>. La principal razón por la que la configuración de cada servicio sea almacenada en un archivo diferente, es para hacer más sencilla la personalización, y menos propensa a modificar otros servicios.
diff --git a/public_html/es-ES/Fedora/11/pdf/Security_Guide/Fedora-11-Security_Guide-es-ES.pdf b/public_html/es-ES/Fedora/11/pdf/Security_Guide/Fedora-11-Security_Guide-es-ES.pdf
index 709ac86..379b36c 100644
Binary files a/public_html/es-ES/Fedora/11/pdf/Security_Guide/Fedora-11-Security_Guide-es-ES.pdf and b/public_html/es-ES/Fedora/11/pdf/Security_Guide/Fedora-11-Security_Guide-es-ES.pdf differ
diff --git a/public_html/es-ES/toc.html b/public_html/es-ES/toc.html
index ba5ddf1..d2fdf8b 100644
--- a/public_html/es-ES/toc.html
+++ b/public_html/es-ES/toc.html
@@ -486,7 +486,7 @@
 					</div>
 	        		
 					<div id='Fedora.11.Security_Guide' class="book collapsed" onclick="toggle(event, 'Fedora.11.Security_Guide.types');">
-						<a class="type" href="Fedora/11/html/Security_Guide/index.html" onclick="window.top.location='./Fedora/11/html/Security_Guide/index.html'"><span class="book">Security Guide</span></a> 
+						<a class="type" href="Fedora/11/html/Security_Guide/index.html" onclick="window.top.location='./Fedora/11/html/Security_Guide/index.html'"><span class="book">Guía de Seguridad</span></a> 
 						<div id='Fedora.11.Security_Guide.types' class="types hidden" onclick="work=0;">
 						
 							<a class="type" href="./Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-es-ES.epub" >epub</a>
diff --git a/public_html/nl-NL/Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-nl-NL.epub b/public_html/nl-NL/Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-nl-NL.epub
index bcd8a8f..d4ad898 100644
Binary files a/public_html/nl-NL/Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-nl-NL.epub and b/public_html/nl-NL/Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-nl-NL.epub differ
diff --git a/public_html/nl-NL/Fedora/11/html-single/Security_Guide/index.html b/public_html/nl-NL/Fedora/11/html-single/Security_Guide/index.html
index 4cd95c9..39502b9 100644
--- a/public_html/nl-NL/Fedora/11/html-single/Security_Guide/index.html
+++ b/public_html/nl-NL/Fedora/11/html-single/Security_Guide/index.html
@@ -1,9 +1,9 @@
 <?xml version="1.0" encoding="UTF-8"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Security Guide</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><meta name="description" content="De Linux beveiligings gids is gemaakt om Linux gebruikers te helpen met het leren van de processen en praktijken voor het beveiligen van werkstations en servers tegen lokale indringing en indringing op afstand, uitbuiting, en kwaadwillige activiteiten. De Linux beveiligings gids beschrijft nauwkeurig de planning en de gereedschappen die nodig zijn voor het maken van een beveiligde computer omgeving voor een data centrum, werkomgeving, en thuisgebruik. Met de juiste administratieve kennis, oplettendheid, en gereed
 schappen, kunnen systemen die Linux draaien zowel volledig functioneel zijn, als beveiligd zijn tegen de meest voorkomende indringings en uitbuitings methodes." /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><div xml:lang="nl-NL" class="book" title="Security Guide" lang="nl-NL"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber">11</span></div><div font-family="sans-se
 rif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="id1894472" class="title">Security Guide</h1></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">Een gids voor het beveiligen van Fedora Linux</h2></div><p class="edition">Uitgave 1.0</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Beveiligings gids</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><meta name="description" content="De Linux beveiligings gids is gemaakt om Linux gebruikers te helpen met het leren van de processen en praktijken voor het beveiligen van werkstations en servers tegen lokale indringing en indringing op afstand, uitbuiting, en kwaadwillige activiteiten. De Linux beveiligings gids beschrijft nauwkeurig de planning en de gereedschappen die nodig zijn voor het maken van een beveiligde computer omgeving voor een data centrum, werkomgeving, en thuisgebruik. Met de juiste administratieve kennis, oplettendheid, en ger
 eedschappen, kunnen systemen die Linux draaien zowel volledig functioneel zijn, als beveiligd zijn tegen de meest voorkomende indringings en uitbuitings methodes." /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><div xml:lang="nl-NL" class="book" title="Beveiligings gids" lang="nl-NL"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber">11</span></div><div font-family="s
 ans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="id1156018" class="title">Beveiligings gids </h1></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">Een gids voor het beveiligen van Fedora Linux</h2></div><p class="edition">Uitgave 1.0</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
 		<span class="inlinemediaobject"><object data="Common_Content/images/title_logo.svg" type="image/svg+xml"> Fedora Documentation Project</object></span>
 
-	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="nl-NL" class="authorgroup" lang="nl-NL"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="id1663319" class="legalnotice"><h1 class="legalnotice">Bericht</h1><div class="para">
+	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="nl-NL" class="authorgroup" lang="nl-NL"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="id1377213" class="legalnotice"><h1 class="legalnotice">Bericht</h1><div class="para">
 		Copyright <span class="trademark"></span>© 2008 Red Hat, Inc.
 	</div><div class="para">
 		The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at <a href="http://creativecommons.org/licenses/by-sa/3.0/">http://creativecommons.org/licenses/by-sa/3.0/</a>. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
@@ -23,11 +23,11 @@
 		All other trademarks are the property of their respective owners.
 	</div></div></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div class="abstract" title="Samenvatting"><h6>Samenvatting</h6><div class="para">
 			De Linux beveiligings gids is gemaakt om Linux gebruikers te helpen met het leren van de processen en praktijken voor het beveiligen van werkstations en servers tegen lokale indringing en indringing op afstand, uitbuiting, en kwaadwillige activiteiten. De Linux beveiligings gids beschrijft nauwkeurig de planning en de gereedschappen die nodig zijn voor het maken van een beveiligde computer omgeving voor een data centrum, werkomgeving, en thuisgebruik. Met de juiste administratieve kennis, oplettendheid, en gereedschappen, kunnen systemen die Linux draaien zowel volledig functioneel zijn, als beveiligd zijn tegen de meest voorkomende indringings en uitbuitings methodes.
-		</div></div></div></div><hr /></div><div class="toc"><dl><dt><span class="preface"><a href="#pref-Security_Guide-Preface">Voorwoord</a></span></dt><dd><dl><dt><span class="section"><a href="#id1259717">1. Document conventies</a></span></dt><dd><dl><dt><span class="section"><a href="#id1511497">1.1. Typografische conventies</a></span></dt><dt><span class="section"><a href="#id1552854">1.2. Pull-quote conventies</a></span></dt><dt><span class="section"><a href="#id1517939">1.3. Opmerkingen en waarschuwingen</a></span></dt></dl></dd><dt><span class="section"><a href="#We_Need_Feedback">2. We hebben terugkoppeling nodig!</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Security_Overview">1. Beveiligings overzicht</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security">1.1. Inleiding tot beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Secur
 ity-What_is_Computer_Security">1.1.1. Wat is computer beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Beveiligings controles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusie</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment">1.2. Kwetsbaarheid beoordeling</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Denk als de vijand</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing">1.2.2. Het definiëren van onderzoeken en testen</a></span></dt><dt><span class="section"><a href="#sect-Securi
 ty_Guide-Vulnerability_Assessment-Evaluating_the_Tools">1.2.3. Het evalueren van de gereedschappen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities">1.3. Aanvallers en kwetsbaarheden</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Een kleine geschiedenis van hackers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security">1.3.2. Bedreigingen voor netwerk beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security">1.3.3. Bedreigingen voor server beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</a
 ></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Common_Exploits_and_Attacks">1.4. Veel voorkomende uitbuitingen en aanvallen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates">1.5. Beveiligings vernieuwingen</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Pakketten vernieuwen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages">1.5.2. Ondertekende pakketten verifiëren</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Installing_Signed_Packages">1.5.3. Ondertekende pakketten installeren</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Applying_the_Changes">1.5.4. De veranderingen toepassen</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Securing_Your_Ne
 twork">2. Je netwerk beveiligen</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security">2.1. Werkstation beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Het onderzoeken van werkstation beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. BIOS en boot loader beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Wachtwoord beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Administratieve controles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Beschikbare netwerk services</a></span></dt><dt><span class="se
 ction"><a href="#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Persoonlijke firewalls</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Communicatie gereedschappen met verbeterde beveiliging</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Server_Security">2.2. Server beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Het beveiligen van services met TCP wrappers en xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Portmap">2.2.2. Portmap beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NIS">2.2.3. Het beveiligen van NIS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NFS
 ">2.2.4. NFS beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">2.2.5. De Apache HTTP server beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_FTP">2.2.6. FTP beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Sendmail">2.2.7. Sendmail beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">2.2.8. Het verifiëren van welke poorten luisteren</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO">2.3. Eenmalig inschrijven (Single sign-on - SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Getti
 ng_Started_with_your_new_Smart_Card">2.3.2. Beginnen met je nieuwe Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">2.3.4. Hoe werkt inloggen met een Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM">2.4. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Voordelen van PAM</a></span></dt><dt><span class="section"><a
  href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">2.4.2. PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">2.4.3. PAM configuratie bestand formaat</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">2.4.4. Voorbeeld PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">2.4.5. PAM modules aanmaken</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching">2.4.6. PAM en administratieve legitimatie opslag</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">2.4.7. PAM
  en apparaat eigendom</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">2.4.8. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd">2.5. TCP wrappers en xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. TCP wrappers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files">2.5.2. Configuratie bestanden voor TCP wrappers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">2.5.4. xinetd configuratie bestanden</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and
 _xinetd-Additional_Resources">2.5.5. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Kerberos">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. Wat is Kerberos?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_Terminology">2.6.2. Kerberos terminologie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-How_Kerberos_Works">2.6.3. Hoe werkt Kerberos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_and_PAM">2.6.4. Kerberos en PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server">2.6.5. Het instellen van een Kerberos 5 server</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">2.6.6. Het instellen van een Kerberos 5 cliënt<
 /a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">2.6.7. Domein naar gebied afbeelding</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">2.6.8. Instellen van secundaire KDC's</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">2.6.9. Cross gebieds authenticatie instellen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Additional_Resources">2.6.10. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs">2.7. Virtuele privé netwerken (VPN's)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. Hoe werk een VPN?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-VPN
 s_and_PROD">2.7.2. VPN's and Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation">2.7.5. IPsec installatie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration">2.7.6. IPsec host-naar-host configuratie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration">2.7.7. IPsec netwerk-naar-netwerk configuratie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPs
 ec_Connection">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Firewalls">2.8. Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter en IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Basic_Firewall_Configuration">2.8.2. Basis firewall instelling</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Using_IPTables">2.8.3. IPTables gebruiken</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Common_IPTables_Filtering">2.8.4. Algemene IPTables filtering</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</a></span></dt><dt><span cla
 ss="section"><a href="#sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses">2.8.6. Kwaadwillige software en bedrogen IP adressen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking">2.8.7. IPTables en verbindingen volgen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPv6">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Additional_Resources">2.8.9. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-IPTables">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Pakket filtering</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains">2.9.2. Verschillen tussen IPTables en IPChains</a></span></dt><dt><span class="section"><a href="#s
 ect-Security_Guide-IPTables-Command_Options_for_IPTables">2.9.3. Commando opties voor IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Saving_IPTables_Rules">2.9.4. Het opslaan van IPTables regels</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_Control_Scripts">2.9.5. IPTables controle scripts</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_and_IPv6">2.9.6. IPTables en IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Additional_Resources">2.9.7. Extra hulpbronnen</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Encryption">3. Versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Data in rust</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encry
 ption">3.2. Volledige schijf versleuteling</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">3.3. Bestand gebaseerde versleuteling</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion">3.4. Data in beweging</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks">3.5. Virtuele privé netwerken</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Secure_Shell">3.6. Beveiligde shell</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption">3.7. LUKS schijf versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. De LUKS implementatie in Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manual
 ly_Encrypting_Directories">3.7.2. Handmatig mappen versleutelen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions">3.7.3. Stap-voor-stap instructies</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished">3.7.4. Wat heb je zojuist bereikt</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest">3.7.5. Interessante verwijzingen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives">3.8. 7-Zip versleutelde archieven</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. 7-Zip installatie in Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_E
 ncrypted_Archives-Installation-Instructions">3.8.2. Stap-voor-stap installatie instructies</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions">3.8.3. Stap-voor-stap gebruiks instructies</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note">3.8.4. Merk op</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG">3.9. GNU Privacy Guard (GnuPG) gebruiken</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Het maken van GPG sleutels in GNOME</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1">3.9.2. Het maken van GPG sleutels in KDE</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE">3.9.3. Het
  maken van GPG sleutels met de commandoregel</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption">3.9.4. Over publieke sleutel versleuteling</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-General_Principles_of_Information_Security">4. Algemene principes van informatie beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Tips, gidsen, en gereedschappen</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Secure_Installation">5. Veilige installatie</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Schijfpartities</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption">5.2. LUKS partitie versleu
 teling gebruiken</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Software_Maintenance">6. Software onderhoud</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Installeer minimale software</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates">6.2. Het plannen en configureren van beveiligingsvernieuwingen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates">6.3. Het aanpassen van automatische vernieuwingen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories">6.4. Installeer ondertekende pakketten van goed bekende repositories</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Securit
 y_Guide-References">7. Referenties</a></span></dt></dl></div><div xml:lang="nl-NL" class="preface" title="Voorwoord" id="pref-Security_Guide-Preface" lang="nl-NL"><div class="titlepage"><div><div><h1 class="title">Voorwoord</h1></div></div></div><div xml:lang="nl-NL" class="section" title="1. Document conventies" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="id1259717">1. Document conventies</h2></div></div></div><div class="para">
+		</div></div></div></div><hr /></div><div class="toc"><dl><dt><span class="preface"><a href="#pref-Security_Guide-Preface">Voorwoord</a></span></dt><dd><dl><dt><span class="section"><a href="#id1464026">1. Document conventies</a></span></dt><dd><dl><dt><span class="section"><a href="#id1591452">1.1. Typografische conventies</a></span></dt><dt><span class="section"><a href="#id1366990">1.2. Pull-quote conventies</a></span></dt><dt><span class="section"><a href="#id2600426">1.3. Opmerkingen en waarschuwingen</a></span></dt></dl></dd><dt><span class="section"><a href="#We_Need_Feedback">2. We hebben terugkoppeling nodig!</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Security_Overview">1. Beveiligings overzicht</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security">1.1. Inleiding tot beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Secur
 ity-What_is_Computer_Security">1.1.1. Wat is computer beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Beveiligings controles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusie</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment">1.2. Kwetsbaarheid beoordeling</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Denk als de vijand</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing">1.2.2. Het definiëren van onderzoeken en testen</a></span></dt><dt><span class="section"><a href="#sect-Securi
 ty_Guide-Vulnerability_Assessment-Evaluating_the_Tools">1.2.3. Het evalueren van de gereedschappen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities">1.3. Aanvallers en kwetsbaarheden</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Een kleine geschiedenis van hackers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security">1.3.2. Bedreigingen voor netwerk beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security">1.3.3. Bedreigingen voor server beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</a
 ></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Common_Exploits_and_Attacks">1.4. Veel voorkomende uitbuitingen en aanvallen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates">1.5. Beveiligings vernieuwingen</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Pakketten vernieuwen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages">1.5.2. Ondertekende pakketten verifiëren</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Installing_Signed_Packages">1.5.3. Ondertekende pakketten installeren</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Applying_the_Changes">1.5.4. De veranderingen toepassen</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Securing_Your_Ne
 twork">2. Je netwerk beveiligen</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security">2.1. Werkstation beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Het onderzoeken van werkstation beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. BIOS en boot loader beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Wachtwoord beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Administratieve controles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Beschikbare netwerk services</a></span></dt><dt><span class="se
 ction"><a href="#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Persoonlijke firewalls</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Communicatie gereedschappen met verbeterde beveiliging</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Server_Security">2.2. Server beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Het beveiligen van services met TCP wrappers en xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Portmap">2.2.2. Portmap beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NIS">2.2.3. Het beveiligen van NIS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NFS
 ">2.2.4. NFS beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">2.2.5. De Apache HTTP server beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_FTP">2.2.6. FTP beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Sendmail">2.2.7. Sendmail beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">2.2.8. Het verifiëren van welke poorten luisteren</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO">2.3. Eenmalig inschrijven (Single sign-on - SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Getti
 ng_Started_with_your_new_Smart_Card">2.3.2. Beginnen met je nieuwe Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">2.3.4. Hoe werkt inloggen met een Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM">2.4. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Voordelen van PAM</a></span></dt><dt><span class="section"><a
  href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">2.4.2. PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">2.4.3. PAM configuratie bestand formaat</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">2.4.4. Voorbeeld PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">2.4.5. PAM modules aanmaken</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching">2.4.6. PAM en administratieve legitimatie opslag</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">2.4.7. PAM
  en apparaat eigendom</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">2.4.8. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd">2.5. TCP wrappers en xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. TCP wrappers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files">2.5.2. Configuratie bestanden voor TCP wrappers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">2.5.4. xinetd configuratie bestanden</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and
 _xinetd-Additional_Resources">2.5.5. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Kerberos">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. Wat is Kerberos?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_Terminology">2.6.2. Kerberos terminologie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-How_Kerberos_Works">2.6.3. Hoe werkt Kerberos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_and_PAM">2.6.4. Kerberos en PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server">2.6.5. Het instellen van een Kerberos 5 server</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">2.6.6. Het instellen van een Kerberos 5 cliënt<
 /a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">2.6.7. Domein naar gebied afbeelding</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">2.6.8. Instellen van secundaire KDC's</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">2.6.9. Cross gebieds authenticatie instellen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Additional_Resources">2.6.10. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs">2.7. Virtuele privé netwerken (VPN's)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. Hoe werk een VPN?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-VPN
 s_and_PROD">2.7.2. VPN's and Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation">2.7.5. IPsec installatie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration">2.7.6. IPsec host-naar-host configuratie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration">2.7.7. IPsec netwerk-naar-netwerk configuratie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPs
 ec_Connection">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Firewalls">2.8. Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter en IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Basic_Firewall_Configuration">2.8.2. Basis firewall instelling</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Using_IPTables">2.8.3. IPTables gebruiken</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Common_IPTables_Filtering">2.8.4. Algemene IPTables filtering</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</a></span></dt><dt><span cla
 ss="section"><a href="#sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses">2.8.6. Kwaadwillige software en bedrogen IP adressen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking">2.8.7. IPTables en verbindingen volgen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPv6">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Additional_Resources">2.8.9. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-IPTables">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Pakket filtering</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains">2.9.2. Verschillen tussen IPTables en IPChains</a></span></dt><dt><span class="section"><a href="#s
 ect-Security_Guide-IPTables-Command_Options_for_IPTables">2.9.3. Commando opties voor IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Saving_IPTables_Rules">2.9.4. Het opslaan van IPTables regels</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_Control_Scripts">2.9.5. IPTables controle scripts</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_and_IPv6">2.9.6. IPTables en IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Additional_Resources">2.9.7. Extra hulpbronnen</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Encryption">3. Versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Data in rust</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encry
 ption">3.2. Volledige schijf versleuteling</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">3.3. Bestand gebaseerde versleuteling</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion">3.4. Data in beweging</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks">3.5. Virtuele privé netwerken</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Secure_Shell">3.6. Beveiligde shell</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption">3.7. LUKS schijf versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. De LUKS implementatie in Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manual
 ly_Encrypting_Directories">3.7.2. Handmatig mappen versleutelen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions">3.7.3. Stap-voor-stap instructies</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished">3.7.4. Wat heb je zojuist bereikt</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest">3.7.5. Interessante verwijzingen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives">3.8. 7-Zip versleutelde archieven</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. 7-Zip installatie in Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_E
 ncrypted_Archives-Installation-Instructions">3.8.2. Stap-voor-stap installatie instructies</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions">3.8.3. Stap-voor-stap gebruiks instructies</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note">3.8.4. Merk op</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG">3.9. GNU Privacy Guard (GnuPG) gebruiken</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Het maken van GPG sleutels in GNOME</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1">3.9.2. Het maken van GPG sleutels in KDE</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE">3.9.3. Het
  maken van GPG sleutels met de commandoregel</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption">3.9.4. Over publieke sleutel versleuteling</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-General_Principles_of_Information_Security">4. Algemene principes van informatie beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Tips, gidsen, en gereedschappen</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Secure_Installation">5. Veilige installatie</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Schijfpartities</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption">5.2. LUKS partitie versleu
 teling gebruiken</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Software_Maintenance">6. Software onderhoud</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Installeer minimale software</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates">6.2. Het plannen en configureren van beveiligingsvernieuwingen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates">6.3. Het aanpassen van automatische vernieuwingen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories">6.4. Installeer ondertekende pakketten van goed bekende repositories</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Securit
 y_Guide-References">7. Referenties</a></span></dt></dl></div><div xml:lang="nl-NL" class="preface" title="Voorwoord" id="pref-Security_Guide-Preface" lang="nl-NL"><div class="titlepage"><div><div><h1 class="title">Voorwoord</h1></div></div></div><div xml:lang="nl-NL" class="section" title="1. Document conventies" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="id1464026">1. Document conventies</h2></div></div></div><div class="para">
 		Dit handboek hanteert verscheidene conventies om bepaalde woorden of zinsdelen te benadrukken en aandacht te vestigen op specifieke delen van informatie.
 	</div><div class="para">
 		In PDF en papieren edities gebruikt dit handboek <a href="https://fedorahosted.org/liberation-fonts/">Liberation Fonts set</a> lettertypen. Het Liberation lettertype wordt ook gebruikt in HTML-edities indien dit lettertype op jouw computer geïnstalleerd is. Indien dat niet het geval is, worden alternatieve, gelijkwaardige lettertypen gebruikt. Opmerking: bij Red Hat Enterprise Linux 5 en later wordt de Liberation Font set standaard ingesteld.
-	</div><div class="section" title="1.1. Typografische conventies"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1511497">1.1. Typografische conventies</h3></div></div></div><div class="para">
+	</div><div class="section" title="1.1. Typografische conventies"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1591452">1.1. Typografische conventies</h3></div></div></div><div class="para">
 			Vier typografische conventies worden gebruikt om aandacht te vestigen op specifieke woorden en zinsdelen. Deze conventies, en de omstandigheden waaronder zij gebruikt worden, luiden als volgt:
 		</div><div class="para">
 			<code class="literal">Mono-spaced Bold</code>
@@ -75,7 +75,7 @@
 			Buiten het standaard gebruik bij het presenteren van een titel van een werk, wordt cursief ingezet om het eerste gebruik van een nieuwe en belangrijke term te benadrukken. Bijvoorbeeld:
 		</div><div class="blockquote"><blockquote class="blockquote"><div class="para">
 				Publican is een <em class="firstterm">DocBook</em> publicatie systeem.
-			</div></blockquote></div></div><div class="section" title="1.2. Pull-quote conventies"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1552854">1.2. Pull-quote conventies</h3></div></div></div><div class="para">
+			</div></blockquote></div></div><div class="section" title="1.2. Pull-quote conventies"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1366990">1.2. Pull-quote conventies</h3></div></div></div><div class="para">
 			Terminal output en broncode lijsten worden worden visueel gescheiden van de omringende tekst.
 		</div><div class="para">
 			Output gestuurd naar een terminal wordt getoond in <code class="computeroutput">mono-spaced roman</code> en als volgt gepresenteerd:
@@ -104,7 +104,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs
    }
 }
 
-</pre></div><div class="section" title="1.3. Opmerkingen en waarschuwingen"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1517939">1.3. Opmerkingen en waarschuwingen</h3></div></div></div><div class="para">
+</pre></div><div class="section" title="1.3. Opmerkingen en waarschuwingen"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id2600426">1.3. Opmerkingen en waarschuwingen</h3></div></div></div><div class="para">
 			Tenslotte gebruiken we drie visuele stijlen om aandacht te vestigen op informatie die anders misschien over het hoofd zou worden gezien.
 		</div><div class="note"><h2>Opmerking</h2><div class="para">
 				Een opmerking is een tip, handigheidje of een alternatieve benadering voor de taak die uitgevoerd moet worden. Het negeren van een opmerking zou geen ernstige gevolgen moeten hebben, maar het leven kan een stuk makkelijker worden als de opmerking gevolgd wordt.
@@ -123,7 +123,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs
 	</div><div xml:lang="nl-NL" class="section" title="1.1. Inleiding tot beveiliging" id="sect-Security_Guide-Introduction_to_Security" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.1. Inleiding tot beveiliging</h2></div></div></div><div class="section" title="1.1.1. Wat is computer beveiliging" id="sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.1.1. Wat is computer beveiliging</h3></div></div></div><div class="para">
 			Computer beveiliging is een algemene term die een breed gebied van computer en informatie verwerking afdekt. Ondernemingen die afhangen van computer systemen en netwerken om hun dagelijkse zakentransacties uit te voeren en toegang hebben tot cruciale informatie, zien hun data als een belangrijk onderdeel van hun totale bezit. Verscheidene uitdrukkingen en metrieken zijn binnengedrongen in onze zakelijke woordenschat, zoals totale kosten van eigendom (total cost of ownership - TCO), en kwaliteit van diensten (quality of service - QoS). Met gebruik van deze metrieken kunnen ondernemingen aspecten bereken zoals data integriteit en hoge-beschikbaarheid als onderdeel van hun planning en procesbeheerskosten. In sommige industrieën, zoals elektronische handel, kan het de beschikbaarheid en betrouwbaarheid van data het verschil zijn tussen succes en mislukken.
 		</div><div class="section" title="1.1.1.1. Hoe is computer beveiliging ontstaan?" id="sect-Security_Guide-What_is_Computer_Security-How_did_Computer_Security_Come_about"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.1. Hoe is computer beveiliging ontstaan?</h4></div></div></div><div class="para">
-				Informatie beveiliging is door de jaren heen gegroeid door het toenemende vertrouwen van publieke netwerken om hun persoonlijke, financielen en andere vertrouwelijke informatie niet te openbaren. Er zijn talrijke voorbeelden zoals de Mitnick <sup>[<a id="id1297557" href="#ftn.id1297557" class="footnote">1</a>]</sup>en de Vladimir Levin <sup>[<a id="id1314735" href="#ftn.id1314735" class="footnote">2</a>]</sup> zaken die organisaties in alle industrieën hebben aangezet om de manier waarop ze informatie behandelen te overdenken, maar ook de overbrenging en onthulling van data. De populariteit van het Internet was een van de belangrijkste ontwikkelingen die aanzette tot een toenemende inspanning in data beveiliging.
+				Informatie beveiliging is door de jaren heen gegroeid door het toenemende vertrouwen van publieke netwerken om hun persoonlijke, financielen en andere vertrouwelijke informatie niet te openbaren. Er zijn talrijke voorbeelden zoals de Mitnick <sup>[<a id="id2614867" href="#ftn.id2614867" class="footnote">1</a>]</sup>en de Vladimir Levin <sup>[<a id="id1511927" href="#ftn.id1511927" class="footnote">2</a>]</sup> zaken die organisaties in alle industrieën hebben aangezet om de manier waarop ze informatie behandelen te overdenken, maar ook de overbrenging en onthulling van data. De populariteit van het Internet was een van de belangrijkste ontwikkelingen die aanzette tot een toenemende inspanning in data beveiliging.
 			</div><div class="para">
 				Een steeds groeiend aantal mensen gebruiken hun persoonlijke computer om toegang te krijgen tot hulpbronnen die het Internet heeft te bieden. Van onderzoeken en vinden van informatie tot elektronische mail en commerciële transacties, wordt het Internet gezien als een van de belangrijkste ontwikkelingen van de 20ste eeuw.
 			</div><div class="para">
@@ -131,19 +131,19 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs
 			</div></div><div class="section" title="1.1.1.2. Beveiliging in deze tijd" id="sect-Security_Guide-What_is_Computer_Security-Security_Today"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.2. Beveiliging in deze tijd</h4></div></div></div><div class="para">
 				In februari 2000 werd een Distributed Denial of Service (DDoS) aanval uitgevoerd op verscheidene van de meest gebruikte sites op het Internet. De aanval maakte yahoo.com, cnn.com, amazon.com, fbi.gov, en verscheidene andere sites volkomen onbereikbaar voor gewone gebruikers, omdat het de routers urenlang bezig hield met ICMP pakket verkeer, ook wel ping flood genoemd. De aanval werd uitgevoerd door onbekende aanvallers met gebruik van speciaal gemaakte, breed verkrijgbare programma's die kwetsbare netwerkservers opzochten en daarop cliënt toepassingen installeerden (trojans genaamd), waarna de aanvallen van alle geïnfecteerde servers de slachtoffer sites overspoelden en ze onbereikbaar maakten. Veel mensen geven de schuld aan fundamentele problemen in de manier waarop routers en de gebruikte protocollen zijn ingesteld om alle binnenkomende data te accepteren, onafhankelijk waar heen of voor welk doel de pakketten verzonden worden.
 			</div><div class="para">
-				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<sup>[<a id="id1440257" href="#ftn.id1440257" class="footnote">3</a>]</sup>
+				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<sup>[<a id="id2590839" href="#ftn.id2590839" class="footnote">3</a>]</sup>
 			</div><div class="para">
-				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<sup>[<a id="id1440244" href="#ftn.id1440244" class="footnote">4</a>]</sup>
+				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<sup>[<a id="id2590830" href="#ftn.id2590830" class="footnote">4</a>]</sup>
 			</div><div class="para">
-				Er wordt geschat dat op dit moment 1.4 miljard mensen over de gehele wereld het Internet gebruiken of hebben gebruikt.<sup>[<a id="id1410938" href="#ftn.id1410938" class="footnote">5</a>]</sup> Te gelijkertijd:
+				Er wordt geschat dat op dit moment 1.4 miljard mensen over de gehele wereld het Internet gebruiken of hebben gebruikt.<sup>[<a id="id2592623" href="#ftn.id2592623" class="footnote">5</a>]</sup> Te gelijkertijd:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<sup>[<a id="id2719696" href="#ftn.id2719696" class="footnote">6</a>]</sup>
+						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<sup>[<a id="id1163934" href="#ftn.id1163934" class="footnote">6</a>]</sup>
 					</div></li><li class="listitem"><div class="para">
-						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<sup>[<a id="id1339838" href="#ftn.id1339838" class="footnote">7</a>]</sup>
+						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<sup>[<a id="id2628876" href="#ftn.id2628876" class="footnote">7</a>]</sup>
 					</div></li><li class="listitem"><div class="para">
-						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<sup>[<a id="id1467521" href="#ftn.id1467521" class="footnote">8</a>]</sup>
+						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<sup>[<a id="id2578838" href="#ftn.id2578838" class="footnote">8</a>]</sup>
 					</div></li></ul></div><div class="para">
-				From a 2008 global survey of business and technology executives "The Global State of Information Security"<sup>[<a id="id1519295" href="#ftn.id1519295" class="footnote">9</a>]</sup>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
+				From a 2008 global survey of business and technology executives "The Global State of Information Security"<sup>[<a id="id1470579" href="#ftn.id1470579" class="footnote">9</a>]</sup>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Slechts 43% van de ondervraagden bewaken de naleving van beveiligingsvoorschriften door gebruikers
 					</div></li><li class="listitem"><div class="para">
@@ -376,7 +376,7 @@ PORT    STATE  SERVICE
 			</div><div class="para">
 				Refer to <a class="xref" href="#sect-Security_Guide-Security_Updates" title="1.5. Beveiligings vernieuwingen">Paragraaf 1.5, “Beveiligings vernieuwingen”</a> for more information about keeping a system up-to-date.
 			</div></div><div class="section" title="1.3.3.3. Onoplettend beheer" id="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.3.3. Onoplettend beheer</h4></div></div></div><div class="para">
-				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<sup>[<a id="id1574358" href="#ftn.id1574358" class="footnote">10</a>]</sup> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
+				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<sup>[<a id="id2831730" href="#ftn.id2831730" class="footnote">10</a>]</sup> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
 			</div><div class="para">
 				Sommige beheerders laten na hun servers en werkstations te corrigeren, terwijl anderen nalaten om de log boodschappen van de systeem kernel of het netwerk verkeer te bekijken. Een andere veel voorkomende fout is het onveranderd laten van standaard wachtwoorden of sleutels voor services. Bijvoorbeeld, sommige databases hebben standaard beheerswachtwoorden omdat de database ontwikkelaars aannemen dat de systeembeheerder deze wachtwoorden onmiddellijk na de installatie zal veranderen. Als een database beheerder nalaat om dit wachtwoord te veranderen, kan zelfs een onervaren cracker het algemeen bekende standaard wachtwoord gebruiken om beheersrechten te krijgen voor de database. Dit zijn slechts een paar voorbeelden van het veroorzaken van in gevaar gebrachte servers door onoplettend beheer.
 			</div></div><div class="section" title="1.3.3.4. Inherent onveilige services" id="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.3.4. Inherent onveilige services</h4></div></div></div><div class="para">
@@ -550,25 +550,25 @@ PORT    STATE  SERVICE
 					</div><div class="para">
 						Om alle actieve IMAP sessies te stoppen, voer je het volgende commando uit:
 					</div><pre class="screen"><code class="command">killall imapd</code>
-</pre></dd></dl></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div class="footnote"><p><sup>[<a id="ftn.id1297557" href="#id1297557" class="para">1</a>] </sup>
+</pre></dd></dl></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div class="footnote"><p><sup>[<a id="ftn.id2614867" href="#id2614867" class="para">1</a>] </sup>
 					http://law.jrank.org/pages/3791/Kevin-Mitnick-Case-1999.html
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1314735" href="#id1314735" class="para">2</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1511927" href="#id1511927" class="para">2</a>] </sup>
 					http://www.livinginternet.com/i/ia_hackers_levin.htm
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1440257" href="#id1440257" class="para">3</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2590839" href="#id2590839" class="para">3</a>] </sup>
 					http://www.theregister.co.uk/2007/05/04/txj_nonfeasance/
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1440244" href="#id1440244" class="para">4</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2590830" href="#id2590830" class="para">4</a>] </sup>
 					http://www.healthcareitnews.com/story.cms?id=9408
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1410938" href="#id1410938" class="para">5</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2592623" href="#id2592623" class="para">5</a>] </sup>
 					http://www.internetworldstats.com/stats.htm
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2719696" href="#id2719696" class="para">6</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1163934" href="#id1163934" class="para">6</a>] </sup>
 							http://www.cert.org
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1339838" href="#id1339838" class="para">7</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id2628876" href="#id2628876" class="para">7</a>] </sup>
 							http://www.cert.org/stats/fullstats.html
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1467521" href="#id1467521" class="para">8</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id2578838" href="#id2578838" class="para">8</a>] </sup>
 							http://www.newsfactor.com/perl/story/16407.html
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1519295" href="#id1519295" class="para">9</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1470579" href="#id1470579" class="para">9</a>] </sup>
 					http://www.csoonline.com/article/454939/The_Global_State_of_Information_Security_
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1574358" href="#id1574358" class="para">10</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2831730" href="#id2831730" class="para">10</a>] </sup>
 					http://www.sans.org/resources/errors.php
 				</p></div></div></div><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 2. Je netwerk beveiligen" id="chap-Security_Guide-Securing_Your_Network" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 2. Je netwerk beveiligen</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security">2.1. Werkstation beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Het onderzoeken van werkstation beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. BIOS en boot loader beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Wachtwoord beveiliging</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Adminis
 trative_Controls">2.1.4. Administratieve controles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Beschikbare netwerk services</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Persoonlijke firewalls</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Communicatie gereedschappen met verbeterde beveiliging</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Server_Security">2.2. Server beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Het beveiligen van services met TCP wrappers en xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Portmap">2.2.2. Portmap 
 beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NIS">2.2.3. Het beveiligen van NIS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NFS">2.2.4. NFS beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">2.2.5. De Apache HTTP server beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_FTP">2.2.6. FTP beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Sendmail">2.2.7. Sendmail beveiligen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">2.2.8. Het verifiëren van welke poorten luisteren</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO">2.3. Eenmalig inschrijven (Singl
 e sign-on - SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card">2.3.2. Beginnen met je nieuwe Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">2.3.4. Hoe werkt inloggen met een Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM">2.4. P
 luggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Voordelen van PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">2.4.2. PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">2.4.3. PAM configuratie bestand formaat</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">2.4.4. Voorbeeld PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">2.4.5. PAM modules aanmaken</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules
 _PAM-PAM_and_Administrative_Credential_Caching">2.4.6. PAM en administratieve legitimatie opslag</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">2.4.7. PAM en apparaat eigendom</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">2.4.8. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd">2.5. TCP wrappers en xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. TCP wrappers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files">2.5.2. Configuratie bestanden voor TCP wrappers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd">2.5.3. xinetd</a></s
 pan></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">2.5.4. xinetd configuratie bestanden</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources">2.5.5. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Kerberos">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. Wat is Kerberos?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_Terminology">2.6.2. Kerberos terminologie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-How_Kerberos_Works">2.6.3. Hoe werkt Kerberos</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_and_PAM">2.6.4. Kerberos en PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-
 Configuring_a_Kerberos_5_Server">2.6.5. Het instellen van een Kerberos 5 server</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">2.6.6. Het instellen van een Kerberos 5 cliënt</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">2.6.7. Domein naar gebied afbeelding</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">2.6.8. Instellen van secundaire KDC's</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">2.6.9. Cross gebieds authenticatie instellen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Additional_Resources">2.6.10. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs">2.7. Virtuele privé netwerken (VPN's)</a></span></dt><dd
 ><dl><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. Hoe werk een VPN?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD">2.7.2. VPN's and Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation">2.7.5. IPsec installatie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration">2.7.6. IPsec host-naar-host configuratie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtu
 al_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration">2.7.7. IPsec netwerk-naar-netwerk configuratie</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Firewalls">2.8. Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter en IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Basic_Firewall_Configuration">2.8.2. Basis firewall instelling</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Using_IPTables">2.8.3. IPTables gebruiken</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Common_IPTables_Filtering">2.8.4. Algemene IPTables f
 iltering</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses">2.8.6. Kwaadwillige software en bedrogen IP adressen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking">2.8.7. IPTables en verbindingen volgen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-IPv6">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Firewalls-Additional_Resources">2.8.9. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-IPTables">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1
 . Pakket filtering</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains">2.9.2. Verschillen tussen IPTables en IPChains</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Command_Options_for_IPTables">2.9.3. Commando opties voor IPTables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Saving_IPTables_Rules">2.9.4. Het opslaan van IPTables regels</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_Control_Scripts">2.9.5. IPTables controle scripts</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-IPTables_and_IPv6">2.9.6. IPTables en IPv6</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-IPTables-Additional_Resources">2.9.7. Extra hulpbronnen</a></span></dt></dl></dd></dl></div><div xml:lang="nl-NL" class="section" title="2.1. Werkstation beveiliging" id="sect-Se
 curity_Guide-Workstation_Security" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.1. Werkstation beveiliging</h2></div></div></div><div class="para">
 		Een Linux omgeving beveiligen begint met het werkstation. Of het gaat om het vergrendelen van een persoonlijke machine of het beveiligen van een bedrijfssysteem, een gezonde beveiligingstactiek begint met de individuele computer. Een computer netwerk slechts zo veilig als zijn zwakste node.
@@ -593,7 +593,7 @@ PORT    STATE  SERVICE
 		</div><div class="para">
 			Als het werkstation zich op een locatie bevindt waarnaar alleen bevoegde of vertrouwde mensen toegang hebben, dan hoeft echter het beveiligen van de BIOS of de boot loader niet nodig zijn.
 		</div><div class="section" title="2.1.2.1. BIOS wachtwoorden" id="sect-Security_Guide-BIOS_and_Boot_Loader_Security-BIOS_Passwords"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.1.2.1. BIOS wachtwoorden</h4></div></div></div><div class="para">
-				De twee belangrijkste redenen voor wachtwoord bescherming van de BIOS van een computer zijn<sup>[<a id="id1487632" href="#ftn.id1487632" class="footnote">11</a>]</sup>:
+				De twee belangrijkste redenen voor wachtwoord bescherming van de BIOS van een computer zijn<sup>[<a id="id2596016" href="#ftn.id2596016" class="footnote">11</a>]</sup>:
 			</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Het voorkomen van het veranderen van de BIOS instelling</em></span> — Als een indringer toegang heeft tot de BIOS, dan kunnen ze deze instellen om op te starten van een CD-ROM of diskette. Dit maakt het voor hen mogelijke om op te starten in de reddings mode of de enkele-gebruikers mode, wat op zijn beurt toestaat om willekeurige processen op het systeem op te starten of om gevoelige data te kopiëren.
 					</div></li><li class="listitem"><div class="para">
@@ -625,7 +625,7 @@ PORT    STATE  SERVICE
 					Vervolgens bewerk je het GRUB configuratie bestand <code class="filename">/boot/grub/grub.conf</code>. Open het bestand en onder de <code class="command">timeout</code> regel in de hoofd sectie van het document, voeg je de volgende regel toe:
 				</div><pre class="screen"><code class="command">password --md5 <em class="replaceable"><code>&lt;password-hash&gt;</code></em></code>
 </pre><div class="para">
-					Replace <em class="replaceable"><code>&lt;password-hash&gt;</code></em> with the value returned by <code class="command">/sbin/grub-md5-crypt</code><sup>[<a id="id1668047" href="#ftn.id1668047" class="footnote">12</a>]</sup>.
+					Replace <em class="replaceable"><code>&lt;password-hash&gt;</code></em> with the value returned by <code class="command">/sbin/grub-md5-crypt</code><sup>[<a id="id1277255" href="#ftn.id1277255" class="footnote">12</a>]</sup>.
 				</div><div class="para">
 					De volgende keer dat het systeem opstart, voorkomt het GRUB menu toegang tot de bewerker of commando interface zonder eerst op <span class="keycap"><strong>p</strong></span> te duwen gevolg door het GRUB wachtwoord.
 				</div><div class="para">
@@ -884,14 +884,14 @@ Account Expiration Date (YYYY-MM-DD) [1969-12-31]:
 							</td></tr><tr><td>
 								Gebruik PAM om root toegang naar services te beperken.
 							</td><td>
-								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<sup>[<a id="id2196156" href="#ftn.id2196156" class="footnote">a</a>]</sup>
+								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<sup>[<a id="id1544414" href="#ftn.id1544414" class="footnote">a</a>]</sup>
 							</td><td>
 								<table border="0" summary="Simple list" class="simplelist"><tr><td>Belet root toegang naar netwerk services die bewust zijn van PAM.</td></tr><tr><td>De volgende services worden belet om root toegang te krijgen:</td></tr><tr><td>· FTP cliënten</td></tr><tr><td>· Email cliënten</td></tr><tr><td>· <code class="command">login</code></td></tr><tr><td>· <code class="command">gdm</code></td></tr><tr><td>· <code class="command">kdm</code></td></tr><tr><td>· <code class="command">xdm</code></td></tr><tr><td>· <code class="command">ssh</code></td></tr><tr><td>· <code class="command">scp</code></td></tr><tr><td>· <code class="command">sftp</code></td></tr><tr><td>· Alle PAM services die bewust zijn van PAM</td></tr></table>
 
 							</td><td>
 								<table border="0" summary="Simple list" class="simplelist"><tr><td>Programma's en services die niet bewust zijn van PAM.</td></tr></table>
 
-							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div class="footnote"><p><sup>[<a id="ftn.id2196156" href="#id2196156" class="para">a</a>] </sup>
+							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div class="footnote"><p><sup>[<a id="ftn.id1544414" href="#id1544414" class="para">a</a>] </sup>
 									Refer to <a class="xref" href="#sect-Security_Guide-Disallowing_Root_Access-Disabling_Root_Using_PAM" title="2.1.4.2.4. Root onmogelijk maken met PAM">Paragraaf 2.1.4.2.4, “Root onmogelijk maken met PAM”</a> for details.
 								</p></div></td></tr></tbody></table></div><h6>Tabel 2.1. Methodes voor het onmogelijk maken van het root account</h6></div><br class="table-break" /><div class="section" title="2.1.4.2.1. De root shell onmogelijk maken" id="sect-Security_Guide-Disallowing_Root_Access-Disabling_the_Root_Shell"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.1.4.2.1. De root shell onmogelijk maken</h5></div></div></div><div class="para">
 					Om te voorkomen dat gebruikers rechtstreeks inloggen als root, kan de systeembeheerder de shell van het root account instellen als <code class="command">/sbin/nologin</code> in het <code class="filename">/etc/passwd</code> bestand. Dit belet toegang tot het root account met commando's die een shell nodig hebben, zoals de <code class="command">su</code> en <code class="command">ssh</code> commando's.
@@ -926,7 +926,7 @@ sense=deny file=/etc/vsftpd.ftpusers onerr=succeed
 			</div><div class="section" title="2.1.4.3.1. Het su commando" id="sect-Security_Guide-Limiting_Root_Access-The_su_Command"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.1.4.3.1. Het <code class="command">su</code> commando</h5></div></div></div><div class="para">
 					Als een gebruiker het <code class="command">su</code> commando uitvoert, wordt deze gevraagd naar het root wachtwoord en, na authenticatie, krijgt deze een root shell prompt.
 				</div><div class="para">
-					Zodra de gebruiker is ingelogd met het <code class="command">su</code> commando, <span class="emphasis"><em>is</em></span> de gebruiker de root gebruiker en heeft absolute beheerstoegang tot het systeem<sup>[<a id="id1174224" href="#ftn.id1174224" class="footnote">13</a>]</sup>. Bovendien ,zodra een gebruiker root wordt, is het voor hen mogelijk om het <code class="command">su</code> commando te gebruiken om te veranderen naar elke andere gebruiker op het systeem zonder naar een wachtwoord gevraagd te worden.
+					Zodra de gebruiker is ingelogd met het <code class="command">su</code> commando, <span class="emphasis"><em>is</em></span> de gebruiker de root gebruiker en heeft absolute beheerstoegang tot het systeem<sup>[<a id="id1356493" href="#ftn.id1356493" class="footnote">13</a>]</sup>. Bovendien ,zodra een gebruiker root wordt, is het voor hen mogelijk om het <code class="command">su</code> commando te gebruiken om te veranderen naar elke andere gebruiker op het systeem zonder naar een wachtwoord gevraagd te worden.
 				</div><div class="para">
 					Omdat dit commando zo krachtig is, zullen beheerders in een organisatie beperkingen willen opleggen voor wie toegang heeft tot dit commando.
 				</div><div class="para">
@@ -2369,7 +2369,7 @@ Sep  7 14:58:33 localhost xinetd[5283]: EXIT: telnet status=0 pid=5285 duration=
 	</div><div class="para">
 		Kerberos is een manier om de noodzaak voor protocollen die onveilige authenticatie methodes toestaan te elimineren, en op die manier de netwerk beveiliging verbeteren.
 	</div><div class="section" title="2.6.1. Wat is Kerberos?" id="sect-Security_Guide-Kerberos-What_is_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.1. Wat is Kerberos?</h3></div></div></div><div class="para">
-			Kerberos is een netwerk authenticatie protocol gemaakt door MIT, wat symmetrische sleutel cryptografie<sup>[<a id="id1868775" href="#ftn.id1868775" class="footnote">14</a>]</sup> gebruikt om gebruikers te authenticeren voor netwerk services, wat betekent dat wachtwoorden nooit echt over het netwerk verstuurd worden.
+			Kerberos is een netwerk authenticatie protocol gemaakt door MIT, wat symmetrische sleutel cryptografie<sup>[<a id="id2598461" href="#ftn.id2598461" class="footnote">14</a>]</sup> gebruikt om gebruikers te authenticeren voor netwerk services, wat betekent dat wachtwoorden nooit echt over het netwerk verstuurd worden.
 		</div><div class="para">
 			Als gevolg hiervan zullen gebruikers die authenticeren voor netwerk services met gebruik van Kerberos, ongeoorloofde gebruikers die proberen wachtwoorden te verzamelen door het bekijken van het netwerk verkeer effectief dwarsbomen.
 		</div><div class="section" title="2.6.1.1. Voordelen van Kerberos" id="sect-Security_Guide-What_is_Kerberos-Advantages_of_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.6.1.1. Voordelen van Kerberos</h4></div></div></div><div class="para">
@@ -3957,13 +3957,13 @@ include "/etc/racoon/<em class="replaceable"><code>X.X.X.X</code></em>.conf"
 						<a href="http://www.netfilter.org/">http://www.netfilter.org/</a> — De thuis pagina van het netfilter/iptables project. Bevat verschillende informatie over <code class="command">iptables</code>, inclusief een FAQ voor specifieke problemen en verscheidene nuttige gidsen door Rusty Russell, de Linux IP firewall onderhouder. De HOWTO documenten op de site behandelen onderwerpen zoals basis netwerk concepten, kernel pakket filtering, en NAT configuraties.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.linuxnewbie.org/nhf/Security/IPtables_Basics.html">http://www.linuxnewbie.org/nhf/Security/IPtables_Basics.html</a> — Een inleiding over de manier waarop pakketten door de Linux kernel bewegen, plus een inleiding voor het maken van basis <code class="command">iptables</code> commando's.
-					</div></li></ul></div></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div class="footnote"><p><sup>[<a id="ftn.id1487632" href="#id1487632" class="para">11</a>] </sup>
+					</div></li></ul></div></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div class="footnote"><p><sup>[<a id="ftn.id2596016" href="#id2596016" class="para">11</a>] </sup>
 					Omdat systeem BIOS'en afhangen van de leverancier, kunnen sommige geen van beide types wachtwoordbescherming ondersteunen, terwijl andere maar een van de twee types hebben.
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1668047" href="#id1668047" class="para">12</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1277255" href="#id1277255" class="para">12</a>] </sup>
 						GRUB also accepts unencrypted passwords, but it is recommended that an MD5 hash be used for added security.
-					</p></div><div class="footnote"><p><sup>[<a id="ftn.id1174224" href="#id1174224" class="para">13</a>] </sup>
+					</p></div><div class="footnote"><p><sup>[<a id="ftn.id1356493" href="#id1356493" class="para">13</a>] </sup>
 						Deze toegang valt nog steeds onder de beperkingen opgelegd door SELinux, als deze is aangezet.
-					</p></div><div class="footnote"><p><sup>[<a id="ftn.id1868775" href="#id1868775" class="para">14</a>] </sup>
+					</p></div><div class="footnote"><p><sup>[<a id="ftn.id2598461" href="#id2598461" class="para">14</a>] </sup>
 				Een systeem waarbij zowel de cliënt als de server een gemeenschappelijke sleutel delen die gebruikt wordt voor het versleutelen en ontsleutelen van netwerk communicatie.
 			</p></div></div></div><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 3. Versleuteling" id="chap-Security_Guide-Encryption" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 3. Versleuteling</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Data in rust</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption">3.2. Volledige schijf versleuteling</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">3.3. Bestand gebaseerde versleuteling</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion">3.4. Data in beweging</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks">3.5. Virtuele privé netwerken</a></span></dt><dt><span class="
 section"><a href="#Security_Guide-Encryption-Data_in_Motion-Secure_Shell">3.6. Beveiligde shell</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption">3.7. LUKS schijf versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. De LUKS implementatie in Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories">3.7.2. Handmatig mappen versleutelen</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions">3.7.3. Stap-voor-stap instructies</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished">3.7.4. Wat heb je zojuist bereikt</a></span></dt><dt><span class="section"><a href="#sect-Secur
 ity_Guide-LUKS_Disk_Encryption-Links_of_Interest">3.7.5. Interessante verwijzingen</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives">3.8. 7-Zip versleutelde archieven</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. 7-Zip installatie in Fedora</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions">3.8.2. Stap-voor-stap installatie instructies</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions">3.8.3. Stap-voor-stap gebruiks instructies</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note">3.8.4. Merk op</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG"
 >3.9. GNU Privacy Guard (GnuPG) gebruiken</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Het maken van GPG sleutels in GNOME</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1">3.9.2. Het maken van GPG sleutels in KDE</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE">3.9.3. Het maken van GPG sleutels met de commandoregel</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption">3.9.4. Over publieke sleutel versleuteling</a></span></dt></dl></dd></dl></div><div class="para">
 		Er zijn twee hoofd types data die beschermd moeten worden: data in beweging en data in rust. Deze verschillende types data worden beschermd op een vergelijkbare manier met gebruik van een vergelijkbare technologie maar de implementatie kan geheel verschillend zijn. Geen enkele beschermings implementatie kan alle mogelijke manier van in gevaar brengen voorkomen omdat dezelfde informatie in rust en in beweging kan zijn op verschillende tijdsmomenten.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html
index cf21751..47e2a29 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.6. Beveiligde shell</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Virtuele privé netwerken" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, 
 to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.6. Beveiligde shell" id="Security_Guide-Encryption-Data_in_Motion-Secure_Shell"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.6. Beveiligde shell</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.6. Beveiligde shell</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Virtuele privé netwerken" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an ifram
 e, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.6. Beveiligde shell" id="Security_Guide-Encryption-Data_in_Motion-Secure_Shell"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.6. Beveiligde shell</h2></div></div></div><div class="para">
 			Beveiligde shell (SSH) is een krachtig netwerk protocol dat wordt gebruikt om te communiceren met een ander systeem over een beveiligd kanaal. De verzendingen over SSH zijn versleuteld en beschermd tegen onderschepping. Cryptografisch aanloggen kan ook gebruikt worden om een betere authenticatie methode te bieden dan de traditionele gebruikersnamen en wachtwoorden.
 		</div><div class="para">
 			SSH is erg eenvoudig te activeren. Simpel door het starten van de sshd service, zal het systeem beginnen met het accepteren van verbindingen en zal het toegang tot het systeem toestaan als een juiste gebruikersnaam en wachtwoord wordt aangeboden tijdens het verbindings proces. De standaard TCP poort voor de SSH service is 22, dit kan echter veranderd worden door het veranderen van het configuratie bestand <span class="emphasis"><em>/etc/ssh/sshd_config</em></span> en het opnieuw opstarten van de service. Dit bestand bevat ook andere configuratie opties voor SSH.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html
index 41f5431..159d1f0 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.5. Virtuele privé netwerken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Data in beweging" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Beveiligde shell" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade yo
 ur browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.5. Virtuele privé netwerken" id="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.5. Virtuele privé netwerken</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.5. Virtuele privé netwerken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Data in beweging" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Beveiligde shell" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade
  your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.5. Virtuele privé netwerken" id="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.5. Virtuele privé netwerken</h2></div></div></div><div class="para">
 			Virtuele privé netwerken (VPN) bieden versleutelde tunnels tussen computers of netwerken van computers over alle poorten. Met een aanwezige VPN wordt alle netwerkverkeer van de cliënt doorgestuurd naar de server via de versleutelde tunnel. Dit betekent dat de cliënt logischerwijs op hetzelfde netwerk is als de server waarmee het verbonden in via de VPN. VPN's komen veel voor en zijn eenvoudig te gebruiken en in te stellen.
 		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Terug</strong>3.4. Data in beweging</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Volgende</strong>3.6. Beveiligde shell</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion.html
index b370bf5..0e30cf9 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Data_in_Motion.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.4. Data in beweging</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Bestand gebaseerde versleuteling" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Virtuele privé netwerken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../
 ../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.4. Data in beweging" id="Security_Guide-Encryption-Data_in_Motion"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.4. Data in beweging</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.4. Data in beweging</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Bestand gebaseerde versleuteling" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Virtuele privé netwerken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="
 ../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.4. Data in beweging" id="Security_Guide-Encryption-Data_in_Motion"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.4. Data in beweging</h2></div></div></div><div class="para">
 			Data in beweging is data die verstuurd wordt over een netwerk. De grootste bedreiging voor data in beweging zijn onderschepping en verandering. Je gebruikersnaam en wachtwoord moeten nooit zonder bescherming over het netwerk verstuurd worden omdat het onderschept kan worden en gebruikt door iemand anders om zich als jou voor te doen of om toegang te krijgen tot gevoelige informatie. Andere privé informatie zoals bankrekening informatie moet ook beschermd worden als het over een netwerk verstuurd wordt. Als de netwerk sessie versleuteld was dan zou je er niet zo druk over hoeven te maken dat data in gevaar wordt gebracht als het verstuurd wordt.
 		</div><div class="para">
 			Data in beweging is in het bijzonder kwetsbaar voor aanvallers omdat de aanvaller zich niet in de buurt van je computer, waarop de data bewaard wordt, hoeft te bevinden, ze hoeven zich slechts ergens langs het pad te bevinden. Versleutelde tunnels kunnen data beschermen langs het communicatie pad.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html
index 156bbf9..aefbb47 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.3. Bestand gebaseerde versleuteling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Volledige schijf versleuteling" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Data in beweging" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.htm
 l">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.3. Bestand gebaseerde versleuteling" id="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.3. Bestand gebaseerde versleuteling</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.3. Bestand gebaseerde versleuteling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Volledige schijf versleuteling" /><link rel="next" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Data in beweging" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.
 html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.3. Bestand gebaseerde versleuteling" id="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.3. Bestand gebaseerde versleuteling</h2></div></div></div><div class="para">
 			GnuPG (GPG) is een open bron versie van PGP dat je toestaat om een bestand of een email bericht te tekenen en/of te versleutelen. Dit is nuttig om de integriteit van het bericht of bestand te behouden en ook om de vertrouwelijkheid van de informatie in het bestand of email bericht te beschermen. In het geval van email, biedt GPG dubbele bescherming. Het biedt niet alleen bescherming voor data in rust, maar ook data in beweging bescherming zodra het bericht over het netwerk verstuurd wordt.
 		</div><div class="para">
 			Bestand gebaseerde versleuteling is bedoeld om een bestand te beschermen nadat het je computer heeft verlaten, zoals wanneer je een CD verstuurt met de post. Sommige bestand gebaseerde versleutelings oplossingen laten restanten van het versleutelde bestand achter die een aanvaller die fysieke toegang tot je computer heeft onder sommige omstandigheden kan ontsleutelen. Om de inhoud van zulke bestanden te beschermen voor aanvallers die toegang tot je computer kunnen hebben, gebruik je bestand gebaseerde versleuteling gecombineerd met een andere oplossing zoals volledige schijf versleuteling.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/We_Need_Feedback.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/We_Need_Feedback.html
index 52fc25d..5d86347 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/We_Need_Feedback.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/We_Need_Feedback.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2. We hebben terugkoppeling nodig!</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="pref-Security_Guide-Preface.html" title="Voorwoord" /><link rel="prev" href="pref-Security_Guide-Preface.html" title="Voorwoord" /><link rel="next" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</ifram
 e></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="pref-Security_Guide-Preface.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Security_Overview.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2. We hebben terugkoppeling nodig!" id="We_Need_Feedback" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2. We hebben terugkoppeling nodig!</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2. We hebben terugkoppeling nodig!</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="pref-Security_Guide-Preface.html" title="Voorwoord" /><link rel="prev" href="pref-Security_Guide-Preface.html" title="Voorwoord" /><link rel="next" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</if
 rame></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="pref-Security_Guide-Preface.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Security_Overview.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2. We hebben terugkoppeling nodig!" id="We_Need_Feedback" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2. We hebben terugkoppeling nodig!</h2></div></div></div><div class="para">
 		Meer informatie over het Linux Security Guide project kan gevonden worden op <a href="https://fedorahosted.org/securityguide">https://fedorahosted.org/securityguide</a>
 	</div><div class="para">
 		Om terugkoppeling te geven over de Beveiligings gids, dien je een foutrapport in op <a href="https://bugzilla.redhat.com/enter_bug.cgi?component=security-guide&amp;product=Fedora%20Documentation">https://bugzilla.redhat.com/enter_bug.cgi?component=security-guide&amp;product=Fedora%20Documentation</a>. Selecteer het juiste onderdeel in het uitklap menu.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Encryption.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Encryption.html
index 67454eb..0aec24f 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Encryption.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 3. Versleuteling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.7.2. Nuttige IPTables websites" /><link rel="next" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Volledige schijf versleuteling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This i
 s an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 3. Versleuteling" id="chap-Security_Guide-Encryption" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 3. Versleuteling</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-E
 ncryption.html#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Data in rust</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html">3.2. Volledige schijf versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html">3.3. Bestand gebaseerde versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">3.4. Data in beweging</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html">3.5. Virtuele privé netwerken</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">3.6. Beveiligde shell</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">3.7. LUKS schijf versleuteling</a></span></dt><dd><dl><dt><span class="secti
 on"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. De LUKS implementatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html">3.7.2. Handmatig mappen versleutelen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html">3.7.3. Stap-voor-stap instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html">3.7.4. Wat heb je zojuist bereikt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html">3.7.5. Interessante verwijzingen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"
 >3.8. 7-Zip versleutelde archieven</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. 7-Zip installatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html">3.8.2. Stap-voor-stap installatie instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html">3.8.3. Stap-voor-stap gebruiks instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html">3.8.4. Merk op</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html">3.9. GNU Privacy Guard (GnuPG) gebruiken</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encr
 yption-Using_GPG.html#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Het maken van GPG sleutels in GNOME</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html">3.9.2. Het maken van GPG sleutels in KDE</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html">3.9.3. Het maken van GPG sleutels met de commandoregel</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html">3.9.4. Over publieke sleutel versleuteling</a></span></dt></dl></dd></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 3. Versleuteling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="index.html" title="Beveiligings gids" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.7.2. Nuttige IPTables websites" /><link rel="next" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Volledige schijf versleuteling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">
 This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 3. Versleuteling" id="chap-Security_Guide-Encryption" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 3. Versleuteling</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_G
 uide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Data in rust</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html">3.2. Volledige schijf versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html">3.3. Bestand gebaseerde versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">3.4. Data in beweging</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html">3.5. Virtuele privé netwerken</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">3.6. Beveiligde shell</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">3.7. LUKS schijf versleuteling</a></span></dt><dd><dl><dt><span class=
 "section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. De LUKS implementatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html">3.7.2. Handmatig mappen versleutelen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html">3.7.3. Stap-voor-stap instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html">3.7.4. Wat heb je zojuist bereikt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html">3.7.5. Interessante verwijzingen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives
 .html">3.8. 7-Zip versleutelde archieven</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. 7-Zip installatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html">3.8.2. Stap-voor-stap installatie instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html">3.8.3. Stap-voor-stap gebruiks instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html">3.8.4. Merk op</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html">3.9. GNU Privacy Guard (GnuPG) gebruiken</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guid
 e-Encryption-Using_GPG.html#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Het maken van GPG sleutels in GNOME</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html">3.9.2. Het maken van GPG sleutels in KDE</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html">3.9.3. Het maken van GPG sleutels met de commandoregel</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html">3.9.4. Over publieke sleutel versleuteling</a></span></dt></dl></dd></dl></div><div class="para">
 		Er zijn twee hoofd types data die beschermd moeten worden: data in beweging en data in rust. Deze verschillende types data worden beschermd op een vergelijkbare manier met gebruik van een vergelijkbare technologie maar de implementatie kan geheel verschillend zijn. Geen enkele beschermings implementatie kan alle mogelijke manier van in gevaar brengen voorkomen omdat dezelfde informatie in rust en in beweging kan zijn op verschillende tijdsmomenten.
 	</div><div class="section" title="3.1. Data in rust" id="sect-Security_Guide-Encryption-Data_at_Rest"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.1. Data in rust</h2></div></div></div><div class="para">
 			Data at rest is data that is stored on a hard drive, tape, CD, DVD, disk, or other media. This information's biggest threat comes from being physically stolen. Laptops in airports, CDs going through the mail, and backup tapes that get left in the wrong places are all examples of events where data can be compromised through theft. If the data was encrypted on the media then you wouldn't have to worry as much about the data being compromised.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html
index 84a2657..10a02e0 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 4. Algemene principes van informatie beveiliging</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Over publieke sleutel versleuteling" /><link rel="next" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">Thi
 s is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Secure_Installation.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 4. Algemene principes van informatie beveiliging" id="chap-Security_Guide-General_Principles_of_Information_Security" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 4. Algemene principes van informatie beveiliging</h2></div></div></div><div class="
 toc"><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Tips, gidsen, en gereedschappen</a></span></dt></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 4. Algemene principes van informatie beveiliging</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="index.html" title="Beveiligings gids" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Over publieke sleutel versleuteling" /><link rel="next" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.htm
 l">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Secure_Installation.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 4. Algemene principes van informatie beveiliging" id="chap-Security_Guide-General_Principles_of_Information_Security" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 4. Algemene principes van informatie beveiliging</h2></div></div></div><div c
 lass="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Tips, gidsen, en gereedschappen</a></span></dt></dl></div><div class="para">
 		De volgende algemene principes geven een overzicht van goede beveiligings praktijken:
 	</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 				versleutel alle data die over het netwerk verstuurd wordt om de-man-in-het-midden aanvallen en afluisteren te helpen voorkomen. Het is belangrijk om authenticatie gegevens, zoals wachtwoorden, te versleutelen.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-References.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-References.html
index 9a0e68e..9be9c8e 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-References.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-References.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 7. Referenties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Installeer ondertekende pakketten van goed bekende repositories" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="
 title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Terug</strong></a></li><li class="next"></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 7. Referenties" id="chap-Security_Guide-References" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 7. Referenties</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 7. Referenties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="index.html" title="Beveiligings gids" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Installeer ondertekende pakketten van goed bekende repositories" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><
 p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Terug</strong></a></li><li class="next"></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 7. Referenties" id="chap-Security_Guide-References" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 7. Referenties</h2></div></div></div><div class="para">
 		De volgende referenties zijn verwijzingen naar extra informatie die relevant is voor SELinux en Fedora maar die buiten het kader van deze gids valt. Merk op dat door de snelle ontwikkeling van SELinux sommige onderdelen van deze informatie alleen betrekking heeft op specifieke vrijgaves van Fedora.
 	</div><div class="variablelist" title="Boeken" id="vari-Security_Guide-References-Books"><h6>Boeken</h6><dl><dt><span class="term">SELinux by Example</span></dt><dd><div class="para">
 					Mayer, MacMillan, en Caplan
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Secure_Installation.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Secure_Installation.html
index be9a836..99494a2 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Secure_Installation.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Secure_Installation.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 5. Veilige installatie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Hoofdstuk 4. Algemene principes van informatie beveiliging" /><link rel="next" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. LUKS partitie versleuteling gebruiken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" sr
 c="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 5. Veilige installatie" id="chap-Security_Guide-Secure_Installation" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 5. Veilige installatie</h2></div></div></div><div class="toc"><dl><dt><span 
 class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Schijfpartities</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">5.2. LUKS partitie versleuteling gebruiken</a></span></dt></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 5. Veilige installatie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="index.html" title="Beveiligings gids" /><link rel="prev" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Hoofdstuk 4. Algemene principes van informatie beveiliging" /><link rel="next" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. LUKS partitie versleuteling gebruiken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="t
 oc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 5. Veilige installatie" id="chap-Security_Guide-Secure_Installation" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 5. Veilige installatie</h2></div></div></div><div class="toc"><dl><dt>
 <span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Schijfpartities</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">5.2. LUKS partitie versleuteling gebruiken</a></span></dt></dl></div><div class="para">
 		Beveiliging begint met de eerste keer dat je een CD of DVD aanbrengt in je schijfstation om Fedora te installeren. Het veilig instellen van je systeem vanaf het begin maakt het gemakkelijker om later extra beveiligings instellingen te maken.
 	</div><div class="section" title="5.1. Schijfpartities" id="sect-Security_Guide-Secure_Installation-Disk_Partitions"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">5.1. Schijfpartities</h2></div></div></div><div class="para">
 			Het NSA beveelt het aanmaken van aparte partities voor /boot, /, /home, /tmp, en /var/tmp aan. De redenen hiervoor zijn verschillend en we zullen elke partitie behandelen.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html
index 4a52fd1..daeb93f 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 2. Je netwerk beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. De veranderingen toepassen" /><link rel="next" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enabl
 e iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 2. Je netwerk beveiligen" id="chap-Security_Guide-Securing_Your_Network" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 2. Je netwerk beveiligen</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">2.1. W
 erkstation beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Het onderzoeken van werkstation beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. BIOS en boot loader beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Wachtwoord beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Administratieve controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Availab
 le_Network_Services">2.1.5. Beschikbare netwerk services</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Persoonlijke firewalls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Communicatie gereedschappen met verbeterde beveiliging</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">2.2. Server beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Het beveiligen van services met TCP wrappers en xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">2.2.2. Portmap beveiligen
 </a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">2.2.3. Het beveiligen van NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">2.2.4. NFS beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">2.2.5. De Apache HTTP server beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">2.2.6. FTP beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">2.2.7. Sendmail beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">2.2.8. Het verifiëren van welke poorten luisteren</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">2.3. Eenmalig 
 inschrijven (Single sign-on - SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">2.3.2. Beginnen met je nieuwe Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">2.3.4. Hoe werkt inloggen met een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</a></span></dt></dl></dd><dt><span class="sectio
 n"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">2.4. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Voordelen van PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">2.4.2. PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">2.4.3. PAM configuratie bestand formaat</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">2.4.4. Voorbeeld PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-
 Creating_PAM_Modules.html">2.4.5. PAM modules aanmaken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">2.4.6. PAM en administratieve legitimatie opslag</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html">2.4.7. PAM en apparaat eigendom</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">2.4.8. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">2.5. TCP wrappers en xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrap
 pers_and_xinetd-TCP_Wrappers_Configuration_Files.html">2.5.2. Configuratie bestanden voor TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">2.5.4. xinetd configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">2.5.5. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. Wat is Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">2.6.2. Kerberos terminologie</a></span></dt><dt><span class="section"><a href
 ="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">2.6.3. Hoe werkt Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">2.6.4. Kerberos en PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">2.6.5. Het instellen van een Kerberos 5 server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">2.6.6. Het instellen van een Kerberos 5 cliënt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">2.6.7. Domein naar gebied afbeelding</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">2.6.8. Instellen van secundaire KDC's</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">2.6.9. Cross gebieds authenticatie 
 instellen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">2.6.10. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html">2.7. Virtuele privé netwerken (VPN's)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. Hoe werk een VPN?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html">2.7.2. VPN's and Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</a></span></dt><d
 t><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html">2.7.5. IPsec installatie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html">2.7.6. IPsec host-naar-host configuratie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html">2.7.7. IPsec netwerk-naar-netwerk configuratie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html">2.8. Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html#sect-Security_Guide-Firewalls-Netfilter_and_IPTab
 les">2.8.1. Netfilter en IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html">2.8.2. Basis firewall instelling</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Using_IPTables.html">2.8.3. IPTables gebruiken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html">2.8.4. Algemene IPTables filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html">2.8.6. Kwaadwillige software en bedrogen IP adressen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html">2.8.7. IPTables en verb
 indingen volgen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPv6.html">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Additional_Resources.html">2.8.9. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-IPTables.html">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-IPTables.html#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Pakket filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html">2.9.2. Verschillen tussen IPTables en IPChains</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html">2.9.3. Commando opties voor IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html">2.9.4. Het opslaan van IPTables re
 gels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html">2.9.5. IPTables controle scripts</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html">2.9.6. IPTables en IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Additional_Resources.html">2.9.7. Extra hulpbronnen</a></span></dt></dl></dd></dl></div><div xml:lang="nl-NL" class="section" title="2.1. Werkstation beveiliging" id="sect-Security_Guide-Workstation_Security" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.1. Werkstation beveiliging</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 2. Je netwerk beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="index.html" title="Beveiligings gids" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. De veranderingen toepassen" /><link rel="next" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or
  enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 2. Je netwerk beveiligen" id="chap-Security_Guide-Securing_Your_Network" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 2. Je netwerk beveiligen</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">
 2.1. Werkstation beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Het onderzoeken van werkstation beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. BIOS en boot loader beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Wachtwoord beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Administratieve controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-A
 vailable_Network_Services">2.1.5. Beschikbare netwerk services</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Persoonlijke firewalls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Communicatie gereedschappen met verbeterde beveiliging</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">2.2. Server beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Het beveiligen van services met TCP wrappers en xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">2.2.2. Portmap beve
 iligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">2.2.3. Het beveiligen van NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">2.2.4. NFS beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">2.2.5. De Apache HTTP server beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">2.2.6. FTP beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">2.2.7. Sendmail beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">2.2.8. Het verifiëren van welke poorten luisteren</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">2.3. Een
 malig inschrijven (Single sign-on - SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">2.3.2. Beginnen met je nieuwe Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">2.3.4. Hoe werkt inloggen met een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</a></span></dt></dl></dd><dt><span class="
 section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">2.4. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Voordelen van PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">2.4.2. PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">2.4.3. PAM configuratie bestand formaat</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">2.4.4. Voorbeeld PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Module
 s_PAM-Creating_PAM_Modules.html">2.4.5. PAM modules aanmaken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">2.4.6. PAM en administratieve legitimatie opslag</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html">2.4.7. PAM en apparaat eigendom</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">2.4.8. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">2.5. TCP wrappers en xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TC
 P_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">2.5.2. Configuratie bestanden voor TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">2.5.4. xinetd configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">2.5.5. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. Wat is Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">2.6.2. Kerberos terminologie</a></span></dt><dt><span class="section"><
 a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">2.6.3. Hoe werkt Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">2.6.4. Kerberos en PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">2.6.5. Het instellen van een Kerberos 5 server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">2.6.6. Het instellen van een Kerberos 5 cliënt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">2.6.7. Domein naar gebied afbeelding</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">2.6.8. Instellen van secundaire KDC's</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">2.6.9. Cross gebieds authenti
 catie instellen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">2.6.10. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html">2.7. Virtuele privé netwerken (VPN's)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. Hoe werk een VPN?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html">2.7.2. VPN's and Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</a></span><
 /dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html">2.7.5. IPsec installatie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html">2.7.6. IPsec host-naar-host configuratie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html">2.7.7. IPsec netwerk-naar-netwerk configuratie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html">2.8. Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html#sect-Security_Guide-Firewalls-Netfilter_and
 _IPTables">2.8.1. Netfilter en IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html">2.8.2. Basis firewall instelling</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Using_IPTables.html">2.8.3. IPTables gebruiken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html">2.8.4. Algemene IPTables filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html">2.8.6. Kwaadwillige software en bedrogen IP adressen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html">2.8.7. IPTables e
 n verbindingen volgen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPv6.html">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Additional_Resources.html">2.8.9. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-IPTables.html">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-IPTables.html#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Pakket filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html">2.9.2. Verschillen tussen IPTables en IPChains</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html">2.9.3. Commando opties voor IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html">2.9.4. Het opslaan van IPTab
 les regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html">2.9.5. IPTables controle scripts</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html">2.9.6. IPTables en IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Additional_Resources.html">2.9.7. Extra hulpbronnen</a></span></dt></dl></dd></dl></div><div xml:lang="nl-NL" class="section" title="2.1. Werkstation beveiliging" id="sect-Security_Guide-Workstation_Security" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.1. Werkstation beveiliging</h2></div></div></div><div class="para">
 		Een Linux omgeving beveiligen begint met het werkstation. Of het gaat om het vergrendelen van een persoonlijke machine of het beveiligen van een bedrijfssysteem, een gezonde beveiligingstactiek begint met de individuele computer. Een computer netwerk slechts zo veilig als zijn zwakste node.
 	</div><div class="section" title="2.1.1. Het onderzoeken van werkstation beveiliging" id="sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.1.1. Het onderzoeken van werkstation beveiliging</h3></div></div></div><div class="para">
 			Als de beveiliging van een Fedora werkstation onderzocht wordt, overweeg dan het volgende:
@@ -23,7 +23,7 @@
 		</div><div class="para">
 			Als het werkstation zich op een locatie bevindt waarnaar alleen bevoegde of vertrouwde mensen toegang hebben, dan hoeft echter het beveiligen van de BIOS of de boot loader niet nodig zijn.
 		</div><div class="section" title="2.1.2.1. BIOS wachtwoorden" id="sect-Security_Guide-BIOS_and_Boot_Loader_Security-BIOS_Passwords"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.1.2.1. BIOS wachtwoorden</h4></div></div></div><div class="para">
-				De twee belangrijkste redenen voor wachtwoord bescherming van de BIOS van een computer zijn<sup>[<a id="id1424792" href="#ftn.id1424792" class="footnote">11</a>]</sup>:
+				De twee belangrijkste redenen voor wachtwoord bescherming van de BIOS van een computer zijn<sup>[<a id="id1850819" href="#ftn.id1850819" class="footnote">11</a>]</sup>:
 			</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Het voorkomen van het veranderen van de BIOS instelling</em></span> — Als een indringer toegang heeft tot de BIOS, dan kunnen ze deze instellen om op te starten van een CD-ROM of diskette. Dit maakt het voor hen mogelijke om op te starten in de reddings mode of de enkele-gebruikers mode, wat op zijn beurt toestaat om willekeurige processen op het systeem op te starten of om gevoelige data te kopiëren.
 					</div></li><li class="listitem"><div class="para">
@@ -55,7 +55,7 @@
 					Vervolgens bewerk je het GRUB configuratie bestand <code class="filename">/boot/grub/grub.conf</code>. Open het bestand en onder de <code class="command">timeout</code> regel in de hoofd sectie van het document, voeg je de volgende regel toe:
 				</div><pre class="screen"><code class="command">password --md5 <em class="replaceable"><code>&lt;password-hash&gt;</code></em></code>
 </pre><div class="para">
-					Replace <em class="replaceable"><code>&lt;password-hash&gt;</code></em> with the value returned by <code class="command">/sbin/grub-md5-crypt</code><sup>[<a id="id1373509" href="#ftn.id1373509" class="footnote">12</a>]</sup>.
+					Replace <em class="replaceable"><code>&lt;password-hash&gt;</code></em> with the value returned by <code class="command">/sbin/grub-md5-crypt</code><sup>[<a id="id1264178" href="#ftn.id1264178" class="footnote">12</a>]</sup>.
 				</div><div class="para">
 					De volgende keer dat het systeem opstart, voorkomt het GRUB menu toegang tot de bewerker of commando interface zonder eerst op <span class="keycap"><strong>p</strong></span> te duwen gevolg door het GRUB wachtwoord.
 				</div><div class="para">
@@ -314,14 +314,14 @@ Account Expiration Date (YYYY-MM-DD) [1969-12-31]:
 							</td></tr><tr><td>
 								Gebruik PAM om root toegang naar services te beperken.
 							</td><td>
-								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<sup>[<a id="id2713515" href="#ftn.id2713515" class="footnote">a</a>]</sup>
+								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<sup>[<a id="id1340178" href="#ftn.id1340178" class="footnote">a</a>]</sup>
 							</td><td>
 								<table border="0" summary="Simple list" class="simplelist"><tr><td>Belet root toegang naar netwerk services die bewust zijn van PAM.</td></tr><tr><td>De volgende services worden belet om root toegang te krijgen:</td></tr><tr><td>· FTP cliënten</td></tr><tr><td>· Email cliënten</td></tr><tr><td>· <code class="command">login</code></td></tr><tr><td>· <code class="command">gdm</code></td></tr><tr><td>· <code class="command">kdm</code></td></tr><tr><td>· <code class="command">xdm</code></td></tr><tr><td>· <code class="command">ssh</code></td></tr><tr><td>· <code class="command">scp</code></td></tr><tr><td>· <code class="command">sftp</code></td></tr><tr><td>· Alle PAM services die bewust zijn van PAM</td></tr></table>
 
 							</td><td>
 								<table border="0" summary="Simple list" class="simplelist"><tr><td>Programma's en services die niet bewust zijn van PAM.</td></tr></table>
 
-							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div class="footnote"><p><sup>[<a id="ftn.id2713515" href="#id2713515" class="para">a</a>] </sup>
+							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div class="footnote"><p><sup>[<a id="ftn.id1340178" href="#id1340178" class="para">a</a>] </sup>
 									Refer to <a class="xref" href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Disallowing_Root_Access-Disabling_Root_Using_PAM" title="2.1.4.2.4. Root onmogelijk maken met PAM">Paragraaf 2.1.4.2.4, “Root onmogelijk maken met PAM”</a> for details.
 								</p></div></td></tr></tbody></table></div><h6>Tabel 2.1. Methodes voor het onmogelijk maken van het root account</h6></div><br class="table-break" /><div class="section" title="2.1.4.2.1. De root shell onmogelijk maken" id="sect-Security_Guide-Disallowing_Root_Access-Disabling_the_Root_Shell"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.1.4.2.1. De root shell onmogelijk maken</h5></div></div></div><div class="para">
 					Om te voorkomen dat gebruikers rechtstreeks inloggen als root, kan de systeembeheerder de shell van het root account instellen als <code class="command">/sbin/nologin</code> in het <code class="filename">/etc/passwd</code> bestand. Dit belet toegang tot het root account met commando's die een shell nodig hebben, zoals de <code class="command">su</code> en <code class="command">ssh</code> commando's.
@@ -356,7 +356,7 @@ sense=deny file=/etc/vsftpd.ftpusers onerr=succeed
 			</div><div class="section" title="2.1.4.3.1. Het su commando" id="sect-Security_Guide-Limiting_Root_Access-The_su_Command"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.1.4.3.1. Het <code class="command">su</code> commando</h5></div></div></div><div class="para">
 					Als een gebruiker het <code class="command">su</code> commando uitvoert, wordt deze gevraagd naar het root wachtwoord en, na authenticatie, krijgt deze een root shell prompt.
 				</div><div class="para">
-					Zodra de gebruiker is ingelogd met het <code class="command">su</code> commando, <span class="emphasis"><em>is</em></span> de gebruiker de root gebruiker en heeft absolute beheerstoegang tot het systeem<sup>[<a id="id2548886" href="#ftn.id2548886" class="footnote">13</a>]</sup>. Bovendien ,zodra een gebruiker root wordt, is het voor hen mogelijk om het <code class="command">su</code> commando te gebruiken om te veranderen naar elke andere gebruiker op het systeem zonder naar een wachtwoord gevraagd te worden.
+					Zodra de gebruiker is ingelogd met het <code class="command">su</code> commando, <span class="emphasis"><em>is</em></span> de gebruiker de root gebruiker en heeft absolute beheerstoegang tot het systeem<sup>[<a id="id1413006" href="#ftn.id1413006" class="footnote">13</a>]</sup>. Bovendien ,zodra een gebruiker root wordt, is het voor hen mogelijk om het <code class="command">su</code> commando te gebruiken om te veranderen naar elke andere gebruiker op het systeem zonder naar een wachtwoord gevraagd te worden.
 				</div><div class="para">
 					Omdat dit commando zo krachtig is, zullen beheerders in een organisatie beperkingen willen opleggen voor wie toegang heeft tot dit commando.
 				</div><div class="para">
@@ -530,10 +530,10 @@ sense=deny file=/etc/vsftpd.ftpusers onerr=succeed
 				Although the <code class="command">sshd</code> service is inherently secure, the service <span class="emphasis"><em>must</em></span> be kept up-to-date to prevent security threats. Refer to <a class="xref" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen">Paragraaf 1.5, “Beveiligings vernieuwingen”</a> for more information.
 			</div></div><div class="para">
 			GPG is een manier om privé email communicatie te verzekeren. Het kan gebruikt worden zowel voor het emailen van gevoelige data over publieke netwerken, als het beschermen van gevoelige data op harde schijven.
-		</div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id1424792" href="#id1424792" class="para">11</a>] </sup>
+		</div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id1850819" href="#id1850819" class="para">11</a>] </sup>
 					Omdat systeem BIOS'en afhangen van de leverancier, kunnen sommige geen van beide types wachtwoordbescherming ondersteunen, terwijl andere maar een van de twee types hebben.
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1373509" href="#id1373509" class="para">12</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1264178" href="#id1264178" class="para">12</a>] </sup>
 						GRUB also accepts unencrypted passwords, but it is recommended that an MD5 hash be used for added security.
-					</p></div><div class="footnote"><p><sup>[<a id="ftn.id2548886" href="#id2548886" class="para">13</a>] </sup>
+					</p></div><div class="footnote"><p><sup>[<a id="ftn.id1413006" href="#id1413006" class="para">13</a>] </sup>
 						Deze toegang valt nog steeds onder de beperkingen opgelegd door SELinux, als deze is aangezet.
 					</p></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Terug</strong>1.5.4. De veranderingen toepassen</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security.html"><strong>Volgende</strong>2.2. Server beveiliging</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Security_Overview.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Security_Overview.html
index fd8b45e..e7d7a75 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Security_Overview.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Security_Overview.html
@@ -1,13 +1,13 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 1. Beveiligings overzicht</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="We_Need_Feedback.html" title="2. We hebben terugkoppeling nodig!" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</ifram
 e></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="We_Need_Feedback.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 1. Beveiligings overzicht" id="chap-Security_Guide-Security_Overview" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 1. Beveiligings overzicht</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security">1.1. Inleiding tot beveiliging</a></span></dt><dd><dl><dt><span c
 lass="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. Wat is computer beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Beveiligings controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusie</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.2. Kwetsbaarheid beoordeling</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-Vulnerability_Assessment-Thin
 king_Like_the_Enemy">1.2.1. Denk als de vijand</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.2.2. Het definiëren van onderzoeken en testen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.2.3. Het evalueren van de gereedschappen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.3. Aanvallers en kwetsbaarheden</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Een kleine geschiedenis van hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html">1.3.2. Bedreigingen voor netwerk beveiliging</a></span></dt><dt><span class="
 section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.3.3. Bedreigingen voor server beveiliging</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Veel voorkomende uitbuitingen en aanvallen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Beveiligings vernieuwingen</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Pakketten vernieuwen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Ondertekende pakketten verif
 iëren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Ondertekende pakketten installeren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. De veranderingen toepassen</a></span></dt></dl></dd></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 1. Beveiligings overzicht</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="index.html" title="Beveiligings gids" /><link rel="prev" href="We_Need_Feedback.html" title="2. We hebben terugkoppeling nodig!" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.<
 /iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="We_Need_Feedback.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 1. Beveiligings overzicht" id="chap-Security_Guide-Security_Overview" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 1. Beveiligings overzicht</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security">1.1. Inleiding tot beveiliging</a></span></dt><dd><dl><dt><
 span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. Wat is computer beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Beveiligings controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusie</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.2. Kwetsbaarheid beoordeling</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-Vulnerability_Assessmen
 t-Thinking_Like_the_Enemy">1.2.1. Denk als de vijand</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.2.2. Het definiëren van onderzoeken en testen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.2.3. Het evalueren van de gereedschappen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.3. Aanvallers en kwetsbaarheden</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Een kleine geschiedenis van hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html">1.3.2. Bedreigingen voor netwerk beveiliging</a></span></dt><dt><span c
 lass="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.3.3. Bedreigingen voor server beveiliging</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Veel voorkomende uitbuitingen en aanvallen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Beveiligings vernieuwingen</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Pakketten vernieuwen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Ondertekende pakketten
  verifiëren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Ondertekende pakketten installeren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. De veranderingen toepassen</a></span></dt></dl></dd></dl></div><div class="para">
 		Door het toenemende vertrouwen op krachtige computers in een netwerk om te helpen bedrijven draaiende te houden en contact te houden met onze persoonlijke informatie, zijn complete bedrijven ontstaan rond de praktijk van netwerk en computer beveiliging. Ondernemingen hebben de kennis en vaardigheden van beveiligings deskundigen ingeroepen om systemen correct te controleren en om aangepaste oplossingen te maken voor de werk vereisten van de organisatie. Omdat de meeste organisaties in toenemende mate dynamisch van natuur zijn, met werknemers die de IT hulpbronnen van de onderneming lokaal en op afstand benaderen, is de behoefte aan beveiligde computeromgevingen sterk toegenomen.
 	</div><div class="para">
 		Helaas zien de meeste organisaties (maar ook individuele gebruikers) beveiling pas op de laatste plaats, een proces dat vergeten wordt door de aandacht voor toenemende rekenkracht, productiviteit, en budgettaire zaken. De juiste beveiligings implementatie wordt vaak <em class="firstterm">postmortem</em> uitgevoerd — nadat een ongeoorloofde indringing heeft plaats gevonden. Beveiligings deskundigen zijn er over eens dat het nemen van de juiste maatregelen voordat een locatie aangesloten wordt op een onbetrouwbaar netwerk, zoals het Internet, een effectieve manier is om de meeste indringings pogingen af te wenden.
 	</div><div xml:lang="nl-NL" class="section" title="1.1. Inleiding tot beveiliging" id="sect-Security_Guide-Introduction_to_Security" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.1. Inleiding tot beveiliging</h2></div></div></div><div class="section" title="1.1.1. Wat is computer beveiliging" id="sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.1.1. Wat is computer beveiliging</h3></div></div></div><div class="para">
 			Computer beveiliging is een algemene term die een breed gebied van computer en informatie verwerking afdekt. Ondernemingen die afhangen van computer systemen en netwerken om hun dagelijkse zakentransacties uit te voeren en toegang hebben tot cruciale informatie, zien hun data als een belangrijk onderdeel van hun totale bezit. Verscheidene uitdrukkingen en metrieken zijn binnengedrongen in onze zakelijke woordenschat, zoals totale kosten van eigendom (total cost of ownership - TCO), en kwaliteit van diensten (quality of service - QoS). Met gebruik van deze metrieken kunnen ondernemingen aspecten bereken zoals data integriteit en hoge-beschikbaarheid als onderdeel van hun planning en procesbeheerskosten. In sommige industrieën, zoals elektronische handel, kan het de beschikbaarheid en betrouwbaarheid van data het verschil zijn tussen succes en mislukken.
 		</div><div class="section" title="1.1.1.1. Hoe is computer beveiliging ontstaan?" id="sect-Security_Guide-What_is_Computer_Security-How_did_Computer_Security_Come_about"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.1. Hoe is computer beveiliging ontstaan?</h4></div></div></div><div class="para">
-				Informatie beveiliging is door de jaren heen gegroeid door het toenemende vertrouwen van publieke netwerken om hun persoonlijke, financielen en andere vertrouwelijke informatie niet te openbaren. Er zijn talrijke voorbeelden zoals de Mitnick <sup>[<a id="id2555923" href="#ftn.id2555923" class="footnote">1</a>]</sup>en de Vladimir Levin <sup>[<a id="id2555914" href="#ftn.id2555914" class="footnote">2</a>]</sup> zaken die organisaties in alle industrieën hebben aangezet om de manier waarop ze informatie behandelen te overdenken, maar ook de overbrenging en onthulling van data. De populariteit van het Internet was een van de belangrijkste ontwikkelingen die aanzette tot een toenemende inspanning in data beveiliging.
+				Informatie beveiliging is door de jaren heen gegroeid door het toenemende vertrouwen van publieke netwerken om hun persoonlijke, financielen en andere vertrouwelijke informatie niet te openbaren. Er zijn talrijke voorbeelden zoals de Mitnick <sup>[<a id="id2015214" href="#ftn.id2015214" class="footnote">1</a>]</sup>en de Vladimir Levin <sup>[<a id="id2015206" href="#ftn.id2015206" class="footnote">2</a>]</sup> zaken die organisaties in alle industrieën hebben aangezet om de manier waarop ze informatie behandelen te overdenken, maar ook de overbrenging en onthulling van data. De populariteit van het Internet was een van de belangrijkste ontwikkelingen die aanzette tot een toenemende inspanning in data beveiliging.
 			</div><div class="para">
 				Een steeds groeiend aantal mensen gebruiken hun persoonlijke computer om toegang te krijgen tot hulpbronnen die het Internet heeft te bieden. Van onderzoeken en vinden van informatie tot elektronische mail en commerciële transacties, wordt het Internet gezien als een van de belangrijkste ontwikkelingen van de 20ste eeuw.
 			</div><div class="para">
@@ -15,19 +15,19 @@
 			</div></div><div class="section" title="1.1.1.2. Beveiliging in deze tijd" id="sect-Security_Guide-What_is_Computer_Security-Security_Today"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.2. Beveiliging in deze tijd</h4></div></div></div><div class="para">
 				In februari 2000 werd een Distributed Denial of Service (DDoS) aanval uitgevoerd op verscheidene van de meest gebruikte sites op het Internet. De aanval maakte yahoo.com, cnn.com, amazon.com, fbi.gov, en verscheidene andere sites volkomen onbereikbaar voor gewone gebruikers, omdat het de routers urenlang bezig hield met ICMP pakket verkeer, ook wel ping flood genoemd. De aanval werd uitgevoerd door onbekende aanvallers met gebruik van speciaal gemaakte, breed verkrijgbare programma's die kwetsbare netwerkservers opzochten en daarop cliënt toepassingen installeerden (trojans genaamd), waarna de aanvallen van alle geïnfecteerde servers de slachtoffer sites overspoelden en ze onbereikbaar maakten. Veel mensen geven de schuld aan fundamentele problemen in de manier waarop routers en de gebruikte protocollen zijn ingesteld om alle binnenkomende data te accepteren, onafhankelijk waar heen of voor welk doel de pakketten verzonden worden.
 			</div><div class="para">
-				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<sup>[<a id="id2709533" href="#ftn.id2709533" class="footnote">3</a>]</sup>
+				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<sup>[<a id="id1855587" href="#ftn.id1855587" class="footnote">3</a>]</sup>
 			</div><div class="para">
-				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<sup>[<a id="id1505666" href="#ftn.id1505666" class="footnote">4</a>]</sup>
+				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<sup>[<a id="id1856584" href="#ftn.id1856584" class="footnote">4</a>]</sup>
 			</div><div class="para">
-				Er wordt geschat dat op dit moment 1.4 miljard mensen over de gehele wereld het Internet gebruiken of hebben gebruikt.<sup>[<a id="id1444916" href="#ftn.id1444916" class="footnote">5</a>]</sup> Te gelijkertijd:
+				Er wordt geschat dat op dit moment 1.4 miljard mensen over de gehele wereld het Internet gebruiken of hebben gebruikt.<sup>[<a id="id2181601" href="#ftn.id2181601" class="footnote">5</a>]</sup> Te gelijkertijd:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<sup>[<a id="id1518933" href="#ftn.id1518933" class="footnote">6</a>]</sup>
+						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<sup>[<a id="id2598555" href="#ftn.id2598555" class="footnote">6</a>]</sup>
 					</div></li><li class="listitem"><div class="para">
-						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<sup>[<a id="id1313970" href="#ftn.id1313970" class="footnote">7</a>]</sup>
+						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<sup>[<a id="id1473519" href="#ftn.id1473519" class="footnote">7</a>]</sup>
 					</div></li><li class="listitem"><div class="para">
-						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<sup>[<a id="id1436468" href="#ftn.id1436468" class="footnote">8</a>]</sup>
+						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<sup>[<a id="id2852198" href="#ftn.id2852198" class="footnote">8</a>]</sup>
 					</div></li></ul></div><div class="para">
-				From a 2008 global survey of business and technology executives "The Global State of Information Security"<sup>[<a id="id1408281" href="#ftn.id1408281" class="footnote">9</a>]</sup>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
+				From a 2008 global survey of business and technology executives "The Global State of Information Security"<sup>[<a id="id2835797" href="#ftn.id2835797" class="footnote">9</a>]</sup>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Slechts 43% van de ondervraagden bewaken de naleving van beveiligingsvoorschriften door gebruikers
 					</div></li><li class="listitem"><div class="para">
@@ -100,22 +100,22 @@
 						Personeelsregistratie en verantwoording
 					</div></li></ul></div></div></div><div class="section" title="1.1.4. Conclusie" id="sect-Security_Guide-Introduction_to_Security-Conclusion"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.1.4. Conclusie</h3></div></div></div><div class="para">
 			Nu je iets hebt geleerd over de oorsprong, redenen, en aspecten van beveiliging, zul je het gemakkelijker vinden om de juiste actie koers te bepalen met betrekking tot Fedora. Het is belangrijk om te weten welke factoren en condities beveiliging bepalen om een juiste strategie te bedenken en te implementeren. Met deze informatie in gedachte, kan het proces geformaliseerd worden en wordt het pad duidelijker als je dieper in de specifieke aspecten van het beveiligings proces duikt.
-		</div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id2555923" href="#id2555923" class="para">1</a>] </sup>
+		</div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id2015214" href="#id2015214" class="para">1</a>] </sup>
 					http://law.jrank.org/pages/3791/Kevin-Mitnick-Case-1999.html
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2555914" href="#id2555914" class="para">2</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2015206" href="#id2015206" class="para">2</a>] </sup>
 					http://www.livinginternet.com/i/ia_hackers_levin.htm
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2709533" href="#id2709533" class="para">3</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1855587" href="#id1855587" class="para">3</a>] </sup>
 					http://www.theregister.co.uk/2007/05/04/txj_nonfeasance/
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1505666" href="#id1505666" class="para">4</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1856584" href="#id1856584" class="para">4</a>] </sup>
 					http://www.healthcareitnews.com/story.cms?id=9408
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1444916" href="#id1444916" class="para">5</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2181601" href="#id2181601" class="para">5</a>] </sup>
 					http://www.internetworldstats.com/stats.htm
-				</p></div><div class="footnote"><p><sup>[<a id="ftn.id1518933" href="#id1518933" class="para">6</a>] </sup>
+				</p></div><div class="footnote"><p><sup>[<a id="ftn.id2598555" href="#id2598555" class="para">6</a>] </sup>
 							http://www.cert.org
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1313970" href="#id1313970" class="para">7</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1473519" href="#id1473519" class="para">7</a>] </sup>
 							http://www.cert.org/stats/fullstats.html
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1436468" href="#id1436468" class="para">8</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id2852198" href="#id2852198" class="para">8</a>] </sup>
 							http://www.newsfactor.com/perl/story/16407.html
-						</p></div><div class="footnote"><p><sup>[<a id="ftn.id1408281" href="#id1408281" class="para">9</a>] </sup>
+						</p></div><div class="footnote"><p><sup>[<a id="ftn.id2835797" href="#id2835797" class="para">9</a>] </sup>
 					http://www.csoonline.com/article/454939/The_Global_State_of_Information_Security_
 				</p></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="We_Need_Feedback.html"><strong>Terug</strong>2. We hebben terugkoppeling nodig!</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Volgende</strong>1.2. Kwetsbaarheid beoordeling</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Software_Maintenance.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Software_Maintenance.html
index 49101dc..9734015 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Software_Maintenance.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/chap-Security_Guide-Software_Maintenance.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 6. Software onderhoud</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. LUKS partitie versleuteling gebruiken" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfram
 e" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 6. Software onderhoud" id="chap-Security_Guide-Software_Maintenance" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 6. Software onderhoud</h2></div></div></div><
 div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Installeer minimale software</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">6.2. Het plannen en configureren van beveiligingsvernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">6.3. Het aanpassen van automatische vernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">6.4. Installeer ondertekende pakketten van goed bekende repositories</a></span></dt></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Hoofdstuk 6. Software onderhoud</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="index.html" title="Beveiligings gids" /><link rel="prev" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. LUKS partitie versleuteling gebruiken" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="t
 ocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 6. Software onderhoud" id="chap-Security_Guide-Software_Maintenance" lang="nl-NL"><div class="titlepage"><div><div><h2 class="title">Hoofdstuk 6. Software onderhoud</h2></div></div><
 /div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Installeer minimale software</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">6.2. Het plannen en configureren van beveiligingsvernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">6.3. Het aanpassen van automatische vernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">6.4. Installeer ondertekende pakketten van goed bekende repositories</a></span></dt></dl></div><div class="para">
 		Software onderhoud is erg belangrijk om de beveiliging van een systeem te handhaven. Het is van vitaal belang om software te patchen zodra deze beschikbaar komen om aanvallers te verhinderen om bekende problemen te gebruiken om je systeem binnen te dringen.
 	</div><div class="section" title="6.1. Installeer minimale software" id="sect-Security_Guide-Software_Maintenance-Install_Minimal_Software"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">6.1. Installeer minimale software</h2></div></div></div><div class="para">
 			Het is een goede praktijk om alleen die pakketten te installeren die je wilt gebruiken omdat ieder stukje software op je systeem een kwetsbaarheid kan bevatten. Als je installeert van de DVD media gebruik dan de mogelijkheid om precies die pakketten te selecteren die je tijdens de installatie wilt installeren. Als je ontdekt dat je nog een pakket nodig hebt, kun je het altijd later nog aan je systeem toevoegen.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/index.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/index.html
index 398531b..e079591 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/index.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/index.html
@@ -1,9 +1,9 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Security Guide</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><meta name="description" content="De Linux beveiligings gids is gemaakt om Linux gebruikers te helpen met het leren van de processen en praktijken voor het beveiligen van werkstations en servers tegen lokale indringing en indringing op afstand, uitbuiting, en kwaadwillige activiteiten. De Linux beveiligings gids beschrijft nauwkeurig de planning en de gereedschappen die nodig zijn voor het maken van een beveiligde computer omgeving voor een data centrum, werkomgeving, en thuisgebruik. Met de juiste administratieve kennis, oplettendheid, en gereed
 schappen, kunnen systemen die Linux draaien zowel volledig functioneel zijn, als beveiligd zijn tegen de meest voorkomende indringings en uitbuitings methodes." /><link rel="home" href="index.html" title="Security Guide" /><link rel="next" href="pref-Security_Guide-Preface.html" title="Voorwoord" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="book" titl
 e="Security Guide" lang="nl-NL"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber">11</span></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="id1881398" class="title">Security Guide</h1></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">Een gids voor het beveiligen van Fedora Linux</h2></div><p class="edition">Uitgave 1.0</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Beveiligings gids</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><meta name="description" content="De Linux beveiligings gids is gemaakt om Linux gebruikers te helpen met het leren van de processen en praktijken voor het beveiligen van werkstations en servers tegen lokale indringing en indringing op afstand, uitbuiting, en kwaadwillige activiteiten. De Linux beveiligings gids beschrijft nauwkeurig de planning en de gereedschappen die nodig zijn voor het maken van een beveiligde computer omgeving voor een data centrum, werkomgeving, en thuisgebruik. Met de juiste administratieve kennis, oplettendheid, en ger
 eedschappen, kunnen systemen die Linux draaien zowel volledig functioneel zijn, als beveiligd zijn tegen de meest voorkomende indringings en uitbuitings methodes." /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="next" href="pref-Security_Guide-Preface.html" title="Voorwoord" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="book
 " title="Beveiligings gids" lang="nl-NL"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber">11</span></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="id1158380" class="title">Beveiligings gids </h1></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">Een gids voor het beveiligen van Fedora Linux</h2></div><p class="edition">Uitgave 1.0</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
 		<span class="inlinemediaobject"><object data="Common_Content/images/title_logo.svg" type="image/svg+xml"> Fedora Documentation Project</object></span>
 
-	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="nl-NL" class="authorgroup" lang="nl-NL"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="id1880995" class="legalnotice"><h1 class="legalnotice">Bericht</h1><div class="para">
+	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="nl-NL" class="authorgroup" lang="nl-NL"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="id1583425" class="legalnotice"><h1 class="legalnotice">Bericht</h1><div class="para">
 		Copyright <span class="trademark"></span>© 2008 Red Hat, Inc.
 	</div><div class="para">
 		The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at <a href="http://creativecommons.org/licenses/by-sa/3.0/">http://creativecommons.org/licenses/by-sa/3.0/</a>. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
@@ -23,4 +23,4 @@
 		All other trademarks are the property of their respective owners.
 	</div></div></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div class="abstract" title="Samenvatting"><h6>Samenvatting</h6><div class="para">
 			De Linux beveiligings gids is gemaakt om Linux gebruikers te helpen met het leren van de processen en praktijken voor het beveiligen van werkstations en servers tegen lokale indringing en indringing op afstand, uitbuiting, en kwaadwillige activiteiten. De Linux beveiligings gids beschrijft nauwkeurig de planning en de gereedschappen die nodig zijn voor het maken van een beveiligde computer omgeving voor een data centrum, werkomgeving, en thuisgebruik. Met de juiste administratieve kennis, oplettendheid, en gereedschappen, kunnen systemen die Linux draaien zowel volledig functioneel zijn, als beveiligd zijn tegen de meest voorkomende indringings en uitbuitings methodes.
-		</div></div></div></div><hr /></div><div class="toc"><dl><dt><span class="preface"><a href="pref-Security_Guide-Preface.html">Voorwoord</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1259629">1. Document conventies</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1336039">1.1. Typografische conventies</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id2727332">1.2. Pull-quote conventies</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1890924">1.3. Opmerkingen en waarschuwingen</a></span></dt></dl></dd><dt><span class="section"><a href="We_Need_Feedback.html">2. We hebben terugkoppeling nodig!</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Security_Overview.html">1. Beveiligings overzicht</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.
 html#sect-Security_Guide-Introduction_to_Security">1.1. Inleiding tot beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. Wat is computer beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Beveiligings controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusie</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.2. Kwetsbaarheid beoordeling</a></span></dt><dd><dl><dt><span class="s
 ection"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Denk als de vijand</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.2.2. Het definiëren van onderzoeken en testen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.2.3. Het evalueren van de gereedschappen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.3. Aanvallers en kwetsbaarheden</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Een kleine geschiedenis van hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabili
 ties-Threats_to_Network_Security.html">1.3.2. Bedreigingen voor netwerk beveiliging</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.3.3. Bedreigingen voor server beveiliging</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Veel voorkomende uitbuitingen en aanvallen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Beveiligings vernieuwingen</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Pakketten vernieuwen</a></span></dt><dt><span class="section
 "><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Ondertekende pakketten verifiëren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Ondertekende pakketten installeren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. De veranderingen toepassen</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Securing_Your_Network.html">2. Je netwerk beveiligen</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">2.1. Werkstation beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Het onderzoeken van werkstation beveiliging</a></
 span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. BIOS en boot loader beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Wachtwoord beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Administratieve controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Beschikbare netwerk services</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Persoonlijke firewalls</a></span></d
 t><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Communicatie gereedschappen met verbeterde beveiliging</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">2.2. Server beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Het beveiligen van services met TCP wrappers en xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">2.2.2. Portmap beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">2.2.3. Het beveiligen van NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">2.2.4. NFS beveil
 igen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">2.2.5. De Apache HTTP server beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">2.2.6. FTP beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">2.2.7. Sendmail beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">2.2.8. Het verifiëren van welke poorten luisteren</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">2.3. Eenmalig inschrijven (Single sign-on - SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</a></span></dt><dt><span class="section"><a href="s
 ect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">2.3.2. Beginnen met je nieuwe Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">2.3.4. Hoe werkt inloggen met een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">2.4. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide
 -Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Voordelen van PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">2.4.2. PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">2.4.3. PAM configuratie bestand formaat</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">2.4.4. Voorbeeld PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">2.4.5. PAM modules aanmaken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">2.4.6. PAM en administratieve legitimatie opslag
 </a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html">2.4.7. PAM en apparaat eigendom</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">2.4.8. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">2.5. TCP wrappers en xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">2.5.2. Configuratie bestanden voor TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">2.5.3. xinetd</a></span></dt><dt><span class="se
 ction"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">2.5.4. xinetd configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">2.5.5. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. Wat is Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">2.6.2. Kerberos terminologie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">2.6.3. Hoe werkt Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">2.6.4. Kerberos en PAM</a></span></dt><dt><span class="section"><a href="s
 ect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">2.6.5. Het instellen van een Kerberos 5 server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">2.6.6. Het instellen van een Kerberos 5 cliënt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">2.6.7. Domein naar gebied afbeelding</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">2.6.8. Instellen van secundaire KDC's</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">2.6.9. Cross gebieds authenticatie instellen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">2.6.10. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html">
 2.7. Virtuele privé netwerken (VPN's)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. Hoe werk een VPN?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html">2.7.2. VPN's and Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html">2.7.5. IPsec installatie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Config
 uration.html">2.7.6. IPsec host-naar-host configuratie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html">2.7.7. IPsec netwerk-naar-netwerk configuratie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html">2.8. Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter en IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html">2.8.2. Basis firewall instelling</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewa
 lls-Using_IPTables.html">2.8.3. IPTables gebruiken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html">2.8.4. Algemene IPTables filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html">2.8.6. Kwaadwillige software en bedrogen IP adressen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html">2.8.7. IPTables en verbindingen volgen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPv6.html">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Additional_Resources.html">2.8.9. Extra hulpbronnen</a></sp
 an></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-IPTables.html">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-IPTables.html#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Pakket filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html">2.9.2. Verschillen tussen IPTables en IPChains</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html">2.9.3. Commando opties voor IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html">2.9.4. Het opslaan van IPTables regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html">2.9.5. IPTables controle scripts</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html">2.9.6. 
 IPTables en IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Additional_Resources.html">2.9.7. Extra hulpbronnen</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Encryption.html">3. Versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Data in rust</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html">3.2. Volledige schijf versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html">3.3. Bestand gebaseerde versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">3.4. Data in beweging</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_
 Networks.html">3.5. Virtuele privé netwerken</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">3.6. Beveiligde shell</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">3.7. LUKS schijf versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. De LUKS implementatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html">3.7.2. Handmatig mappen versleutelen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html">3.7.3. Stap-voor-stap instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Di
 rectories-What_you_have_just_accomplished.html">3.7.4. Wat heb je zojuist bereikt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html">3.7.5. Interessante verwijzingen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html">3.8. 7-Zip versleutelde archieven</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. 7-Zip installatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html">3.8.2. Stap-voor-stap installatie instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html">3.8.3. Stap-voor-stap gebruiks instructies</a></span></dt><dt><s
 pan class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html">3.8.4. Merk op</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html">3.9. GNU Privacy Guard (GnuPG) gebruiken</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Het maken van GPG sleutels in GNOME</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html">3.9.2. Het maken van GPG sleutels in KDE</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html">3.9.3. Het maken van GPG sleutels met de commandoregel</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html">3.9.4. Over publieke sleutel versleuteling</a></spa
 n></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html">4. Algemene principes van informatie beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Tips, gidsen, en gereedschappen</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Secure_Installation.html">5. Veilige installatie</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Schijfpartities</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">5.2. LUKS partitie versleuteling gebruiken</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Gui
 de-Software_Maintenance.html">6. Software onderhoud</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Installeer minimale software</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">6.2. Het plannen en configureren van beveiligingsvernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">6.3. Het aanpassen van automatische vernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">6.4. Installeer ondertekende pakketten van goed bekende repositories</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-References.html">7. Refere
 nties</a></span></dt></dl></div></div><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Volgende</strong>Voorwoord</a></li></ul></body></html>
+		</div></div></div></div><hr /></div><div class="toc"><dl><dt><span class="preface"><a href="pref-Security_Guide-Preface.html">Voorwoord</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1445119">1. Document conventies</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1290931">1.1. Typografische conventies</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1174476">1.2. Pull-quote conventies</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#id1291522">1.3. Opmerkingen en waarschuwingen</a></span></dt></dl></dd><dt><span class="section"><a href="We_Need_Feedback.html">2. We hebben terugkoppeling nodig!</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Security_Overview.html">1. Beveiligings overzicht</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.
 html#sect-Security_Guide-Introduction_to_Security">1.1. Inleiding tot beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. Wat is computer beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Beveiligings controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusie</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.2. Kwetsbaarheid beoordeling</a></span></dt><dd><dl><dt><span class="s
 ection"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Denk als de vijand</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.2.2. Het definiëren van onderzoeken en testen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.2.3. Het evalueren van de gereedschappen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.3. Aanvallers en kwetsbaarheden</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Een kleine geschiedenis van hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabili
 ties-Threats_to_Network_Security.html">1.3.2. Bedreigingen voor netwerk beveiliging</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.3.3. Bedreigingen voor server beveiliging</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Veel voorkomende uitbuitingen en aanvallen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Beveiligings vernieuwingen</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Pakketten vernieuwen</a></span></dt><dt><span class="section
 "><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Ondertekende pakketten verifiëren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Ondertekende pakketten installeren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. De veranderingen toepassen</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Securing_Your_Network.html">2. Je netwerk beveiligen</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">2.1. Werkstation beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Het onderzoeken van werkstation beveiliging</a></
 span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. BIOS en boot loader beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Wachtwoord beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Administratieve controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Beschikbare netwerk services</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Persoonlijke firewalls</a></span></d
 t><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Communicatie gereedschappen met verbeterde beveiliging</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">2.2. Server beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Het beveiligen van services met TCP wrappers en xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">2.2.2. Portmap beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">2.2.3. Het beveiligen van NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">2.2.4. NFS beveil
 igen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">2.2.5. De Apache HTTP server beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">2.2.6. FTP beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">2.2.7. Sendmail beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">2.2.8. Het verifiëren van welke poorten luisteren</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">2.3. Eenmalig inschrijven (Single sign-on - SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</a></span></dt><dt><span class="section"><a href="s
 ect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">2.3.2. Beginnen met je nieuwe Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">2.3.4. Hoe werkt inloggen met een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">2.4. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide
 -Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Voordelen van PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">2.4.2. PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">2.4.3. PAM configuratie bestand formaat</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">2.4.4. Voorbeeld PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">2.4.5. PAM modules aanmaken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">2.4.6. PAM en administratieve legitimatie opslag
 </a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html">2.4.7. PAM en apparaat eigendom</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">2.4.8. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">2.5. TCP wrappers en xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">2.5.2. Configuratie bestanden voor TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">2.5.3. xinetd</a></span></dt><dt><span class="se
 ction"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">2.5.4. xinetd configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">2.5.5. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. Wat is Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">2.6.2. Kerberos terminologie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">2.6.3. Hoe werkt Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">2.6.4. Kerberos en PAM</a></span></dt><dt><span class="section"><a href="s
 ect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">2.6.5. Het instellen van een Kerberos 5 server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">2.6.6. Het instellen van een Kerberos 5 cliënt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">2.6.7. Domein naar gebied afbeelding</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">2.6.8. Instellen van secundaire KDC's</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">2.6.9. Cross gebieds authenticatie instellen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">2.6.10. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html">
 2.7. Virtuele privé netwerken (VPN's)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. Hoe werk een VPN?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html">2.7.2. VPN's and Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html">2.7.5. IPsec installatie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Config
 uration.html">2.7.6. IPsec host-naar-host configuratie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html">2.7.7. IPsec netwerk-naar-netwerk configuratie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html">2.8. Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter en IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html">2.8.2. Basis firewall instelling</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewa
 lls-Using_IPTables.html">2.8.3. IPTables gebruiken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html">2.8.4. Algemene IPTables filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html">2.8.6. Kwaadwillige software en bedrogen IP adressen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html">2.8.7. IPTables en verbindingen volgen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPv6.html">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Additional_Resources.html">2.8.9. Extra hulpbronnen</a></sp
 an></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-IPTables.html">2.9. IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-IPTables.html#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Pakket filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html">2.9.2. Verschillen tussen IPTables en IPChains</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html">2.9.3. Commando opties voor IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html">2.9.4. Het opslaan van IPTables regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html">2.9.5. IPTables controle scripts</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html">2.9.6. 
 IPTables en IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Additional_Resources.html">2.9.7. Extra hulpbronnen</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Encryption.html">3. Versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Data in rust</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html">3.2. Volledige schijf versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html">3.3. Bestand gebaseerde versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">3.4. Data in beweging</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_
 Networks.html">3.5. Virtuele privé netwerken</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">3.6. Beveiligde shell</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">3.7. LUKS schijf versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. De LUKS implementatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html">3.7.2. Handmatig mappen versleutelen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html">3.7.3. Stap-voor-stap instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Di
 rectories-What_you_have_just_accomplished.html">3.7.4. Wat heb je zojuist bereikt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html">3.7.5. Interessante verwijzingen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html">3.8. 7-Zip versleutelde archieven</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. 7-Zip installatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html">3.8.2. Stap-voor-stap installatie instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html">3.8.3. Stap-voor-stap gebruiks instructies</a></span></dt><dt><s
 pan class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html">3.8.4. Merk op</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html">3.9. GNU Privacy Guard (GnuPG) gebruiken</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Het maken van GPG sleutels in GNOME</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html">3.9.2. Het maken van GPG sleutels in KDE</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html">3.9.3. Het maken van GPG sleutels met de commandoregel</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html">3.9.4. Over publieke sleutel versleuteling</a></spa
 n></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html">4. Algemene principes van informatie beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Tips, gidsen, en gereedschappen</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Secure_Installation.html">5. Veilige installatie</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Schijfpartities</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">5.2. LUKS partitie versleuteling gebruiken</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Gui
 de-Software_Maintenance.html">6. Software onderhoud</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Installeer minimale software</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">6.2. Het plannen en configureren van beveiligingsvernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">6.3. Het aanpassen van automatische vernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">6.4. Installeer ondertekende pakketten van goed bekende repositories</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-References.html">7. Refere
 nties</a></span></dt></dl></div></div><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Volgende</strong>Voorwoord</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/pref-Security_Guide-Preface.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/pref-Security_Guide-Preface.html
index c73033a..fd1dcd6 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/pref-Security_Guide-Preface.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/pref-Security_Guide-Preface.html
@@ -1,10 +1,10 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Voorwoord</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="index.html" title="Security Guide" /><link rel="next" href="We_Need_Feedback.html" title="2. We hebben terugkoppeling nodig!" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img sr
 c="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="We_Need_Feedback.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="preface" title="Voorwoord" id="pref-Security_Guide-Preface" lang="nl-NL"><div class="titlepage"><div><div><h1 class="title">Voorwoord</h1></div></div></div><div xml:lang="nl-NL" class="section" title="1. Document conventies" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="id1259629">1. Document conventies</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>Voorwoord</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="index.html" title="Beveiligings gids" /><link rel="prev" href="index.html" title="Beveiligings gids" /><link rel="next" href="We_Need_Feedback.html" title="2. We hebben terugkoppeling nodig!" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org
 "><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="We_Need_Feedback.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="preface" title="Voorwoord" id="pref-Security_Guide-Preface" lang="nl-NL"><div class="titlepage"><div><div><h1 class="title">Voorwoord</h1></div></div></div><div xml:lang="nl-NL" class="section" title="1. Document conventies" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="id1445119">1. Document conventies</h2></div></div></div><div class="para">
 		Dit handboek hanteert verscheidene conventies om bepaalde woorden of zinsdelen te benadrukken en aandacht te vestigen op specifieke delen van informatie.
 	</div><div class="para">
 		In PDF en papieren edities gebruikt dit handboek <a href="https://fedorahosted.org/liberation-fonts/">Liberation Fonts set</a> lettertypen. Het Liberation lettertype wordt ook gebruikt in HTML-edities indien dit lettertype op jouw computer geïnstalleerd is. Indien dat niet het geval is, worden alternatieve, gelijkwaardige lettertypen gebruikt. Opmerking: bij Red Hat Enterprise Linux 5 en later wordt de Liberation Font set standaard ingesteld.
-	</div><div class="section" title="1.1. Typografische conventies"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1336039">1.1. Typografische conventies</h3></div></div></div><div class="para">
+	</div><div class="section" title="1.1. Typografische conventies"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1290931">1.1. Typografische conventies</h3></div></div></div><div class="para">
 			Vier typografische conventies worden gebruikt om aandacht te vestigen op specifieke woorden en zinsdelen. Deze conventies, en de omstandigheden waaronder zij gebruikt worden, luiden als volgt:
 		</div><div class="para">
 			<code class="literal">Mono-spaced Bold</code>
@@ -52,7 +52,7 @@
 			Buiten het standaard gebruik bij het presenteren van een titel van een werk, wordt cursief ingezet om het eerste gebruik van een nieuwe en belangrijke term te benadrukken. Bijvoorbeeld:
 		</div><div class="blockquote"><blockquote class="blockquote"><div class="para">
 				Publican is een <em class="firstterm">DocBook</em> publicatie systeem.
-			</div></blockquote></div></div><div class="section" title="1.2. Pull-quote conventies"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id2727332">1.2. Pull-quote conventies</h3></div></div></div><div class="para">
+			</div></blockquote></div></div><div class="section" title="1.2. Pull-quote conventies"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1174476">1.2. Pull-quote conventies</h3></div></div></div><div class="para">
 			Terminal output en broncode lijsten worden worden visueel gescheiden van de omringende tekst.
 		</div><div class="para">
 			Output gestuurd naar een terminal wordt getoond in <code class="computeroutput">mono-spaced roman</code> en als volgt gepresenteerd:
@@ -81,7 +81,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs
    }
 }
 
-</pre></div><div class="section" title="1.3. Opmerkingen en waarschuwingen"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1890924">1.3. Opmerkingen en waarschuwingen</h3></div></div></div><div class="para">
+</pre></div><div class="section" title="1.3. Opmerkingen en waarschuwingen"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="id1291522">1.3. Opmerkingen en waarschuwingen</h3></div></div></div><div class="para">
 			Tenslotte gebruiken we drie visuele stijlen om aandacht te vestigen op informatie die anders misschien over het hoofd zou worden gezien.
 		</div><div class="note"><h2>Opmerking</h2><div class="para">
 				Een opmerking is een tip, handigheidje of een alternatieve benadering voor de taak die uitgevoerd moet worden. Het negeren van een opmerking zou geen ernstige gevolgen moeten hebben, maar het leven kan een stuk makkelijker worden als de opmerking gevolgd wordt.
@@ -89,4 +89,4 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs
 				Important boxes detail things that are easily missed: configuration changes that only apply to the current session, or services that need restarting before an update will apply. Ignoring a box labeled 'Important' won't cause data loss but may cause irritation and frustration.
 			</div></div><div class="warning"><h2>Waarschuwing</h2><div class="para">
 				Een waarschuwing dient niet genegeerd te worden. Waarschuwingen negeren zal ongetwijfeld leiden tot data verlies.
-			</div></div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Terug</strong>Security Guide</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="We_Need_Feedback.html"><strong>Volgende</strong>2. We hebben terugkoppeling nodig!</a></li></ul></body></html>
+			</div></div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Terug</strong>Beveiligings gids </a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="We_Need_Feedback.html"><strong>Volgende</strong>2. We hebben terugkoppeling nodig!</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Books.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Books.html
index 8d47db9..874e413 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Books.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Books.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5.3. Gerelateerde boeken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Nuttige TCP wrapper websites" /><link rel="next" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html
 ">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5.3. Gerelateerde boeken" id="sect-Security_Guide-Additional_Resources-Related_Books"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.5.3. Gerelateerde boeken</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5.3. Gerelateerde boeken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Nuttige TCP wrapper websites" /><link rel="next" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.h
 tml">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5.3. Gerelateerde boeken" id="sect-Security_Guide-Additional_Resources-Related_Books"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.5.3. Gerelateerde boeken</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<em class="citetitle">Hacking Linux Exposed</em> door Brian Hatch, James Lee, en George Kurtz; Osbourne/McGraw-Hill — Een uitstekende beveiligings hulpbron met informatie over TCP wrappers en <code class="systemitem">xinetd</code>.
 					</div></li></ul></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Terug</strong>2.5.5.2. Nuttige TCP wrapper websites</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos.html"><strong>Volgende</strong>2.6. Kerberos</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Documentation.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Documentation.html
index 92836b3..92e3018 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Documentation.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Related_Documentation.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9.3. Gerelateerde documentatie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Nuttige firewall websites" /><link rel="next" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an if
 rame, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9.3. Gerelateerde documentatie" id="sect-Security_Guide-Additional_Resources-Related_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.9.3. Gerelateerde documentatie</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9.3. Gerelateerde documentatie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Nuttige firewall websites" /><link rel="next" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an
  iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9.3. Gerelateerde documentatie" id="sect-Security_Guide-Additional_Resources-Related_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.9.3. Gerelateerde documentatie</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<em class="citetitle">Red Hat Linux Firewalls</em>, door Bill McCarty; Red Hat Press — een uitgebreide referentie voor het bouwen netwerk en server firewalls met gebruiken van open bron bron pakket filtering technologie zoals Netfilter en <code class="command">iptables</code>. Het bevat onderwerpen die het analyseren van firewall logs behandelen, het ontwikkelen van firewall regels, en het aanpassen van je firewall met gebruik van meerdere grafische gereedschappen.
 					</div></li><li class="listitem"><div class="para">
 						<em class="citetitle">Linux Firewalls</em>, door Robert Ziegler; New Riders Press — bevat een schat van informatie over het bouwen vn firewalls met gebruik van zowel <code class="command">ipchains</code> van kernel 2.2 als Netfilter en <code class="command">iptables</code>. Extra beveiligings onderwerpen zoals problemen over toegang op afstand en indringings detectie systemen worden ook behandeld.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html
index b3134a4..8abf0ae 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9.2. Nuttige firewall websites</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Gerelateerde documentatie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../..
 /../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9.2. Nuttige firewall websites" id="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.9.2. Nuttige firewall websites</h4></div></div></div><div class="itemizedlist"
 ><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9.2. Nuttige firewall websites</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Gerelateerde documentatie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="..
 /../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9.2. Nuttige firewall websites" id="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.9.2. Nuttige firewall websites</h4></div></div></div><div class="itemizedli
 st"><ul><li class="listitem"><div class="para">
 						<a href="http://www.netfilter.org/">http://www.netfilter.org/</a> — De officiële thuispagina van het Netfilter en <code class="command">iptables</code> project.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.tldp.org/">http://www.tldp.org/</a> — De Linux Documentation Project bevat verscheidene nuttige handleidingen met betrekking tot het maken en beheren van firewalls.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html
index c1d6542..073f9c4 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.7.2. Nuttige IPTables websites</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Extra hulpbronnen" /><link rel="next" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to vie
 w it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.7.2. Nuttige IPTables websites" id="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.7.2. Nuttige IPTables websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.7.2. Nuttige IPTables websites</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Extra hulpbronnen" /><link rel="next" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to 
 view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.7.2. Nuttige IPTables websites" id="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.7.2. Nuttige IPTables websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://www.netfilter.org/">http://www.netfilter.org/</a> — De thuis pagina van het netfilter/iptables project. Bevat verschillende informatie over <code class="command">iptables</code>, inclusief een FAQ voor specifieke problemen en verscheidene nuttige gidsen door Rusty Russell, de Linux IP firewall onderhouder. De HOWTO documenten op de site behandelen onderwerpen zoals basis netwerk concepten, kernel pakket filtering, en NAT configuraties.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.linuxnewbie.org/nhf/Security/IPtables_Basics.html">http://www.linuxnewbie.org/nhf/Security/IPtables_Basics.html</a> — Een inleiding over de manier waarop pakketten door de Linux kernel bewegen, plus een inleiding voor het maken van basis <code class="command">iptables</code> commando's.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html
index fafd19d..79387f8 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.10.2. Nuttige Kerberos websites</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../t
 oc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.10.2. Nuttige Kerberos websites" id="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.6.10.2. Nuttige Kerberos websites</h4></div></div></div><div class="itemizedlist"><ul><li class="list
 item"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.10.2. Nuttige Kerberos websites</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../.
 ./toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.10.2. Nuttige Kerberos websites" id="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.6.10.2. Nuttige Kerberos websites</h4></div></div></div><div class="itemizedlist"><ul><li class="l
 istitem"><div class="para">
 						<a href="http://web.mit.edu/kerberos/www/">http://web.mit.edu/kerberos/www/</a> — <em class="citetitle">Kerberos: The Network Authentication Protocol</em> webpagina van MIT.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html">http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html</a> — De Kerberos vaak gestelde vragen (FAQ).
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html
index 5b8f193..ac1fa5d 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.8.2. Nuttige PAM websites</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe"
  class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.8.2. Nuttige PAM websites" id="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.8.2. Nuttige PAM websites</h4></div></div></div><div clas
 s="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.8.2. Nuttige PAM websites</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfra
 me" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.8.2. Nuttige PAM websites" id="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.8.2. Nuttige PAM websites</h4></div></div></div><div c
 lass="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://www.kernel.org/pub/linux/libs/pam/">http://www.kernel.org/pub/linux/libs/pam/</a> — De hoofd distributie website voor het Linux-PAM project, deze bevat informatie over verscheidene PAM modules, een FAQ, en extra PAM documentatie.
 					</div><div class="note"><h2>Opmerking</h2><div class="para">
 							De documentatie op bovengenoemde website is voor de laatste vrijgegeven upstream versie van PAM en hoeft niet 100% correct te zijn voor de PAM versie in Fedora.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html
index 15078d6..428a474 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5.2. Nuttige TCP wrapper websites</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Gerelateerde boeken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class
 ="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5.2. Nuttige TCP wrapper websites" id="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.5.2. Nuttige TCP wrapper websites</h4></div></di
 v></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5.2. Nuttige TCP wrapper websites</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Gerelateerde boeken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" cl
 ass="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5.2. Nuttige TCP wrapper websites" id="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.5.2. Nuttige TCP wrapper websites</h4></div><
 /div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://www.xinetd.org">http://www.xinetd.org/</a> — De thuisbasis van <code class="systemitem">xinetd</code>, welke voorbeeld configuratie bestanden bevat, een volledige lijst van eigenschappen, en een informatieve FAQ.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.docstoc.com/docs/2133633/An-Unofficial-Xinetd-Tutorial">http://www.docstoc.com/docs/2133633/An-Unofficial-Xinetd-Tutorial</a> — Een gedegen handleiding die verschillende manieren bespreekt om standaard <code class="systemitem">xinetd</code> configuratie bestanden te optimaliseren voor het bereiken van specifieke beveiligings doelen .
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html
index fe96b84..9b3c06b 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.2. Toegangs controle opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen" /><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html" title="2.5.4
 .3.3. Verbindings en omleidings opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.2. Toegangs controle opties" id="sect-Security_Guide-Altering_x
 inetd_Configuration_Files-Access_Control_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.2. Toegangs controle opties</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.2. Toegangs controle opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen" /><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html" title="2.
 5.4.3.3. Verbindings en omleidings opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.2. Toegangs controle opties" id="sect-Security_Guide-Alterin
 g_xinetd_Configuration_Files-Access_Control_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.2. Toegangs controle opties</h5></div></div></div><div class="para">
 					Users of <code class="systemitem">xinetd</code> services can choose to use the TCP Wrappers hosts access rules, provide access control via the <code class="systemitem">xinetd</code> configuration files, or a mixture of both. Refer to <a class="xref" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers">Paragraaf 2.5.2, “Configuratie bestanden voor TCP wrappers”</a> for more information about TCP Wrappers hosts access control files.
 				</div><div class="para">
 					Deze paragraaf bespreekt het gebruik van <code class="systemitem">xinetd</code> om toegang tot de services te controleren.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html
index 42c85c5..20d9db9 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.3. Verbindings en omleidings opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Toegangs controle opties" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" title="2.5.4.3.4. Hulpbron
 nen beheer opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.3. Verbindings en omleidings opties" id="sect-Security_Guide-Altering_xinetd_Configuration_F
 iles-Binding_and_Redirection_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.3. Verbindings en omleidings opties</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.3. Verbindings en omleidings opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Toegangs controle opties" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" title="2.5.4.3.4. Hulpb
 ronnen beheer opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.3. Verbindings en omleidings opties" id="sect-Security_Guide-Altering_xinetd_Configuratio
 n_Files-Binding_and_Redirection_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.3. Verbindings en omleidings opties</h5></div></div></div><div class="para">
 					De service configuratie bestanden voor <code class="systemitem">xinetd</code> ondersteunen het verbinden van de service aan een IP adres en het omleiden van binnenkomende verzoeken voor die service naar een ander IP adres, hostnaam of poort.
 				</div><div class="para">
 					Verbinden wordt gecontroleerd door de <code class="option">bind</code> optie in de service specifieke configuratie bestanden en verbindt de service met het IP adres van het systeem. Als dit ingesteld is, staat de <code class="option">bind</code> optie alleen verzoeken naar het juiste IP adres toe voor toegang naar de service. Je kunt deze methode gebruiken om verschillende services te verbinden met verschillende netwerk interfaces gebaseerd op de vereisten.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html
index 71666da..9def9f5 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.4. Hulpbronnen beheer opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html" title="2.5.4.3.3. Verbindings en omleidings opties" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen" />
 </head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.4. Hulpbronnen beheer opties" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options"><div
  class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.4. Hulpbronnen beheer opties</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3.4. Hulpbronnen beheer opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html" title="2.5.4.3.3. Verbindings en omleidings opties" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen"
  /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.4. Hulpbronnen beheer opties" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options"><
 div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.4. Hulpbronnen beheer opties</h5></div></div></div><div class="para">
 					De <code class="systemitem">xinetd</code> daemon kan een basis niveau van bescherming bieden voor weigering van dienst (DoS) aanvallen. De instructies van de volgende lijst kunnen helpen om de effectiviteit van zo'n aanval te beperken:
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="option">per_source</code> — Definieert het maximum aantal instantiaties van een service per bron IP adres. Het accepteert alleen gehele getallen als argument en kan gebruikt worden in zowel <code class="filename">xinetd.conf</code> als de configuratie bestanden specifiek voor een service in de <code class="filename">xinetd.d/</code> map.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html
index 1c98dd2..d344f58 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.2. Bedreigingen voor netwerk beveiliging</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging" /></head><body class="toc_embeded "><div id="tocdiv" class="
 toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.2. Bedreigingen voor netwerk beveiliging" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title
 ">1.3.2. Bedreigingen voor netwerk beveiliging</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.2. Bedreigingen voor netwerk beveiliging</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging" /></head><body class="toc_embeded "><div id="tocdiv" clas
 s="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.2. Bedreigingen voor netwerk beveiliging" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="ti
 tle">1.3.2. Bedreigingen voor netwerk beveiliging</h3></div></div></div><div class="para">
 			Slechte praktijken tijdens het instellen van de volgende aspecten van een netwerk kunnen het risico van een aanval vergroten.
 		</div><div class="section" title="1.3.2.1. Onveilige architecturen" id="sect-Security_Guide-Threats_to_Network_Security-Insecure_Architectures"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.2.1. Onveilige architecturen</h4></div></div></div><div class="para">
 				Een verkeerd ingesteld netwerk is de eerste ingang voor niet bevoegde gebruikers. Om een op vertrouwen gebaseerd, open lokaal netwerk kwetsbaar te laten voor het in grote mate onveilige Internet is zoiets als de deur op een kier laten in een misdadige omgeving — gedurende een willekeurige tijds periode gebeurt er niets, maar <span class="emphasis"><em>uiteindelijk</em></span> benut iemand de mogelijkheid.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html
index 9e185c6..7e7d102 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3. Bedreigingen voor server beveiliging</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Bedreigingen voor netwerk beveiliging" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Niet gecorrigeerde services" /></head><body class="toc_embeded "><div
  id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3. Bedreigingen voor server beveiliging" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security"><div class="titlepage"><div><div keep-together.with
 in-column="always"><h3 class="title">1.3.3. Bedreigingen voor server beveiliging</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3. Bedreigingen voor server beveiliging</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Bedreigingen voor netwerk beveiliging" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Niet gecorrigeerde services" /></head><body class="toc_embeded "><
 div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3. Bedreigingen voor server beveiliging" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security"><div class="titlepage"><div><div keep-together.w
 ithin-column="always"><h3 class="title">1.3.3. Bedreigingen voor server beveiliging</h3></div></div></div><div class="para">
 			Server beveiliging is even belangrijk als netwerk beveiliging omdat servers vaak een groot deel van de vitale informatie van een organisatie bevatten. Als een server in gevaar is gebracht, komt zijn gehele inhoud misschien beschikbaar voor de cracker die het naar goeddunken kan stelen of manipuleren. De volgende paragrafen bespreken sommige van de hoofdzaken.
 		</div><div class="section" title="1.3.3.1. Ongebruikte services en open poorten" id="sect-Security_Guide-Threats_to_Server_Security-Unused_Services_and_Open_Ports"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.3.1. Ongebruikte services en open poorten</h4></div></div></div><div class="para">
 				Een volledige installatie van Fedora bevat meer dan 1000 toepassings en bibliotheek pakketten. De meeste serverbeheerders zullen er echter niet voor kiezen om ieder pakket in de distributie te installeren, maar zullen er de voorkeur aangeven om een installatie van basis pakketten uit te voeren, plus een aantal server toepassingen.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html
index acb9a90..2eab69b 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Inherent onveilige services" /><link rel="next" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Kwetsbare cliënt toepassi
 ngen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's" id="sect-Security_Guide-Attackers_an
 d_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Inherent onveilige services" /><link rel="next" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Kwetsbare cliënt toepa
 ssingen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's" id="sect-Security_Guide-Attackers
 _and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</h3></div></div></div><div class="para">
 			Workstations and home PCs may not be as prone to attack as networks or servers, but since they often contain sensitive data, such as credit card information, they are targeted by system crackers. Workstations can also be co-opted without the user's knowledge and used by attackers as "slave" machines in coordinated attacks. For these reasons, knowing the vulnerabilities of a workstation can save users the headache of reinstalling the operating system, or worse, recovering from data theft.
 		</div><div class="section" title="1.3.4.1. Slechte wachtwoorden" id="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Bad_Passwords"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.4.1. Slechte wachtwoorden</h4></div></div></div><div class="para">
 				Bad passwords are one of the easiest ways for an attacker to gain access to a system. For more on how to avoid common pitfalls when creating a password, refer to <a class="xref" href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security" title="2.1.3. Wachtwoord beveiliging">Paragraaf 2.1.3, “Wachtwoord beveiliging”</a>.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities.html
index e6e0beb..10c0237 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Attackers_and_Vulnerabilities.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3. Aanvallers en kwetsbaarheden</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticiperen op je toekomstige behoeftes" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Bedreigingen voor netwerk beveiliging" /></head><body class="toc_embeded "><div i
 d="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.3. Aanvallers en kwetsbaarheden" id="sect-Security_Guide-Attackers_and_Vulnerabilities" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-
 column="always"><h2 class="title">1.3. Aanvallers en kwetsbaarheden</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3. Aanvallers en kwetsbaarheden</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticiperen op je toekomstige behoeftes" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Bedreigingen voor netwerk beveiliging" /></head><body class="toc_embeded "><di
 v id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.3. Aanvallers en kwetsbaarheden" id="sect-Security_Guide-Attackers_and_Vulnerabilities" lang="nl-NL"><div class="titlepage"><div><div keep-together.with
 in-column="always"><h2 class="title">1.3. Aanvallers en kwetsbaarheden</h2></div></div></div><div class="para">
 		Om een goede beveiligings strategie te plannen en te implementeren, moet je bewust zijn van een paar van de problemen die vastberaden en gemotiveerde hackers uitbuiten om systemen in gevaar te brengen. Voordat we echter in detail gaan over deze problemen, moeten we de terminologie definiëren voor het identificeren van een aanvaller.
 	</div><div class="section" title="1.3.1. Een kleine geschiedenis van hackers" id="sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.3.1. Een kleine geschiedenis van hackers</h3></div></div></div><div class="para">
 			De huidige betekenis van de term <em class="firstterm">hacker</em> heeft een oorsprong die teruggaat naar 1960-er jaren en de Massachusetts Institute of Technology (MIT) Tech Model Railroad Club,welke treinstellen ontwierp op een grote schaal en met complexe details. Hacker was de naam die gebruikt werd voor leden van de club die een slimme truc of workaround voor een probleem ontdekten.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html
index 99e6e5b..cf8ad25 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.6. Het activeren van de IPTables service</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. De instellingen opslaan" /><link rel="next" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfr
 ame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.6. Het activeren van de IPTables service" id="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.2.6. Het activeren van d
 e IPTables service</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.6. Het activeren van de IPTables service</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. De instellingen opslaan" /><link rel="next" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="to
 cframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.6. Het activeren van de IPTables service" id="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.2.6. Het activeren va
 n de IPTables service</h4></div></div></div><div class="para">
 				De firewall regels zijn alleen actief als de <code class="command">iptables</code> service draait. Om de service handmatig te starten, gebruik je het volgende commando:
 			</div><pre class="screen">[root at myServer ~] # service iptables restart
 </pre><div class="para">
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html
index 037bb9d..d2377ba 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.2. Het aan- en uitzetten van de firewall</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="prev" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Vertrouwde services" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><if
 rame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.2. Het aan- en uitzetten van de firewall" id="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title"
 >2.8.2.2. Het aan- en uitzetten van de firewall</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.2. Het aan- en uitzetten van de firewall</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="prev" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Vertrouwde services" /></head><body class="toc_embeded "><div id="tocdiv" class="toc">
 <iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.2. Het aan- en uitzetten van de firewall" id="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="tit
 le">2.8.2.2. Het aan- en uitzetten van de firewall</h4></div></div></div><div class="para">
 				Selecteer een van de volgende opties voor de firewall:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<span class="guilabel"><strong>Uitzetten</strong></span> — De firewall uitzetten geeft complete toegang tot je systeem en er vindt geen beveiligingscontrole plaats. Dit moet alleen geselecteerd worden als je op een vertrouwd netwerk draait (niet het Internet) of als je een aangepaste firewall moet instellen met gebruik van het iptables commandoregel gereedschap.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html
index 9f8872f..6aade59 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.4. Andere poorten</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Vertrouwde services" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. De instellingen opslaan" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocf
 rame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.4. Andere poorten" id="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.2.4. Andere poorten</h4></div></div></div><di
 v class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.4. Andere poorten</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Vertrouwde services" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. De instellingen opslaan" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="t
 ocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.4. Andere poorten" id="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.2.4. Andere poorten</h4></div></div></div>
 <div class="para">
 				Het <span class="application"><strong>Firewall Configuration Tool</strong></span> gereedschap heeft een <span class="guilabel"><strong>Andere poorten</strong></span> sectie voor het opgeven van specifieke IP poorten als vertrouwd voor <code class="command">iptables</code>. Bijvoorbeeld, om IRC en Internet printing protocol (IPP) toe te staan door de firewall, voeg je de volgende poorten toe in de <span class="guilabel"><strong>Andere poorten</strong></span> sectie:
 			</div><div class="para">
 				<code class="computeroutput">194:tcp,631:tcp</code>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html
index 0a5e3a1..14c3494 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.5. De instellingen opslaan</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Andere poorten" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Het activeren van de IPTables service" /></head><body class="toc_embeded "><div id="tocdiv" cla
 ss="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.5. De instellingen opslaan" id="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">
 2.8.2.5. De instellingen opslaan</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.5. De instellingen opslaan</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Andere poorten" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Het activeren van de IPTables service" /></head><body class="toc_embeded "><div id="tocdiv" 
 class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.5. De instellingen opslaan" id="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="titl
 e">2.8.2.5. De instellingen opslaan</h4></div></div></div><div class="para">
 				Klik op <span class="guibutton"><strong>OK</strong></span> om de veranderingen op te slaan en de firewall aan of uit te zetten. Als <span class="guilabel"><strong>Aanzetten</strong></span> was geselecteerd, worden de geselecteerde opties vertaald naar <code class="command">iptables</code> commando's en weggeschreven naar het <code class="filename">/etc/sysconfig/iptables</code> bestand. De <code class="command">iptables</code> service wordt ook gestart zodat de firewall onmiddellijk na het opslaan van de geselecteerde opties geactiveerd wordt. Als <span class="guilabel"><strong>Uitzetten</strong></span> was geselecteerd, wordt het <code class="filename">/etc/sysconfig/iptables</code> bestand verwijderd en de <code class="command">iptables</code> service wordt onmiddellijk gestopt.
 			</div><div class="para">
 				De geselecteerde opties worden ook naar het <code class="filename">/etc/sysconfig/system-config-securitylevel</code> bestand geschreven zodat de instellingen hersteld kunnen worden als de toepassing de volgende keer opstart. Bewerk dit bestand niet handmatig.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html
index eac1fc6..c5e26c1 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.3. Vertrouwde services</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Het aan- en uitzetten van de firewall" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Andere poorten" /></head><body class="toc_embeded "><div id="tocdiv" cla
 ss="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.3. Vertrouwde services" id="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8
 .2.3. Vertrouwde services</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2.3. Vertrouwde services</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Het aan- en uitzetten van de firewall" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Andere poorten" /></head><body class="toc_embeded "><div id="tocdiv" 
 class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.3. Vertrouwde services" id="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">
 2.8.2.3. Vertrouwde services</h4></div></div></div><div class="para">
 				Het aanzetten van opties in de <span class="guilabel"><strong>Vertrouwde diensten</strong></span> lijst, laat de opgegeven service door in de firewall.
 			</div><div class="variablelist"><dl><dt><span class="term"><span class="guilabel"><strong>WWW (HTTP)</strong></span></span></dt><dd><div class="para">
 							Het HTTP protocol wordt gebruikt door Apache (en door andere Web servers) om web pagina's beschikbaar te maken. Als je van plan bent om je Web server publiek beschikbaar te maken, selecteer je dit aanvinkhokje. Deze optie is niet nodig om lokaal pagina's te bekijken of voor het ontwikkelen van web pagina's. Deze service vereist dat het <code class="filename">httpd</code> pakket geïnstalleerd is.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html
index cd7cc23..12ece75 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.2. Commando opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.3.3. IPTables parameter opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><if
 rame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.2. Commando opties" id="sect-Security_Guide-Command_Options_for_IPTables-Command_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.3.2. Commando opties</h4></d
 iv></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.2. Commando opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.3.3. IPTables parameter opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc">
 <iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.2. Commando opties" id="sect-Security_Guide-Command_Options_for_IPTables-Command_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.3.2. Commando opties</h4>
 </div></div></div><div class="para">
 				Commando opties instrueren <code class="command">iptables</code> om een bepaalde actie uit te voeren. Slechts een commando optie is toegestaan per <code class="command">iptables</code> commando. Met uitzondering van het help commando, worden alle commando's in hoofdletters geschreven.
 			</div><div class="para">
 				De <code class="command">iptables</code> commando's zijn de volgende:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html
index d087c04..2634b24 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4. IPTables overeenkomst opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.3.3. IPTables parameter opties" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.3.4.2. UDP protocol" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifra
 me id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.4. IPTables overeenkomst opties" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.3.4. IPTable
 s overeenkomst opties</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4. IPTables overeenkomst opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.3.3. IPTables parameter opties" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.3.4.2. UDP protocol" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><i
 frame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.4. IPTables overeenkomst opties" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.3.4. IPTa
 bles overeenkomst opties</h4></div></div></div><div class="para">
 				Different network protocols provide specialized matching options which can be configured to match a particular packet using that protocol. However, the protocol must first be specified in the <code class="command">iptables</code> command. For example, <code class="option">-p <em class="replaceable"><code>&lt;protocol-name&gt;</code></em></code> enables options for the specified protocol. Note that you can also use the protocol ID, instead of the protocol name. Refer to the following examples, each of which have the same effect:
 			</div><pre class="screen"><code class="command"> iptables -A INPUT -p icmp --icmp-type any -j ACCEPT </code>
 </pre><pre class="screen"><code class="command"> iptables -A INPUT -p 5813 --icmp-type any -j ACCEPT </code>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html
index f6c4f6d..a0e41b5 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.3. IPTables parameter opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.3.2. Commando opties" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. IPTables overeenkomst opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"
 ><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.3. IPTables parameter opties" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.
 3.3. IPTables parameter opties</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.3. IPTables parameter opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.3.2. Commando opties" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. IPTables overeenkomst opties" /></head><body class="toc_embeded "><div id="tocdiv" class="t
 oc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.3. IPTables parameter opties" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2
 .9.3.3. IPTables parameter opties</h4></div></div></div><div class="para">
 				Bepaalde <code class="command">iptables</code> commando's, zoals diegene die gebruikt worden voor het toevoegen, aansluiten, verwijderen, invoegen, of vervangen van regels in een bepaalde keten, vereisen verschillende parameters om een pakket filterings regel te maken.
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="option">-c</code> — Zet de tellers voor een bepaalde regel op nul. Deze parameter accepteert de <code class="option">PKTS</code> en <code class="option">BYTES</code> opties op gewenste teller op te geven.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html
index 2575d2b..a3deb9c 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.6. Lijst opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.3.5. Doel opties" /><link rel="next" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.4. Het opslaan van IPTables regels" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src
 ="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.6. Lijst opties" id="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.3.6. Lijst opties</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.6. Lijst opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.3.5. Doel opties" /><link rel="next" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.4. Het opslaan van IPTables regels" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" 
 src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.6. Lijst opties" id="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.3.6. Lijst opties</h4></div></div></div><div class="para">
 				The default list command, <code class="command">iptables -L [&lt;chain-name&gt;]</code>, provides a very basic overview of the default filter table's current chains. Additional options provide more information:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="option">-v</code> — Laat uitgebreide output zien, zoals het aantal pakketten en bytes die elke keten verwerkt heeft, het aantal pakketten en bytes die overeenkwamen met elke regel, en welke interface van toepassing is voor een bepaalde regel.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html
index 25321cf..1f3b525 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.5. Doel opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.3.4.4. Extra overeenkomst optie modules" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.3.6. Lijst opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe
  id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.5. Doel opties" id="sect-Security_Guide-Command_Options_for_IPTables-Target_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.3.5. Doel opties</h4></div></di
 v></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.5. Doel opties</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.3.4.4. Extra overeenkomst optie modules" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.3.6. Lijst opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifr
 ame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.5. Doel opties" id="sect-Security_Guide-Command_Options_for_IPTables-Target_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.9.3.5. Doel opties</h4></div><
 /div></div><div class="para">
 				Als een pakket overeenkomt met een bepaalde regel, kan de regel het pakket naar een aantal verschillende doelen sturen welke de juiste actie bepalen. Elke keten heeft een standaard doel, welke gebruikt wordt als geen enkele regel in die keten overeenkomt met een pakket of als geen van de regels die overeenkomen met het pakket een doel opgeven.
 			</div><div class="para">
 				De volgende zijn de standaard doelen:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Common_Exploits_and_Attacks.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Common_Exploits_and_Attacks.html
index 1bfeb71..d3eb09f 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Common_Exploits_and_Attacks.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Common_Exploits_and_Attacks.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.4. Veel voorkomende uitbuitingen en aanvallen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /><link rel="prev" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Kwetsbare cliënt toepassingen" /><link rel="next" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><if
 rame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Security_Updates.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.4. Veel voorkomende uitbuitingen en aanvallen" id="sect-Security_Guide-Common_Exploits_and_Attacks" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title
 ">1.4. Veel voorkomende uitbuitingen en aanvallen</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.4. Veel voorkomende uitbuitingen en aanvallen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /><link rel="prev" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Kwetsbare cliënt toepassingen" /><link rel="next" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc">
 <iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Security_Updates.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.4. Veel voorkomende uitbuitingen en aanvallen" id="sect-Security_Guide-Common_Exploits_and_Attacks" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="ti
 tle">1.4. Veel voorkomende uitbuitingen en aanvallen</h2></div></div></div><div class="para">
 		<a class="xref" href="sect-Security_Guide-Common_Exploits_and_Attacks.html#tabl-Security_Guide-Common_Exploits_and_Attacks-Common_Exploits" title="Tabel 1.1. Veel voorkomende uitbuitingen">Tabel 1.1, “Veel voorkomende uitbuitingen”</a> details some of the most common exploits and entry points used by intruders to access organizational network resources. Key to these common exploits are the explanations of how they are performed and how administrators can properly safeguard their network against such attacks.
 	</div><div class="table" title="Tabel 1.1. Veel voorkomende uitbuitingen" id="tabl-Security_Guide-Common_Exploits_and_Attacks-Common_Exploits"><div class="table-contents"><table summary="Veel voorkomende uitbuitingen" border="1"><colgroup><col width="20%" /><col width="40%" /><col width="40%" /></colgroup><thead><tr><th>
 						Uitbuiting
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html
index e52d647..50e8b5f 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.2. Stap-voor-stap installatie instructies</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Stap-voor-stap gebruiks instructies" /></head><body class="toc_embeded "><div id="tocdi
 v" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.2. Stap-voor-stap installatie instructies" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions"><div class="titlepage"><div><div keep-together.within-column="alway
 s"><h3 class="title">3.8.2. Stap-voor-stap installatie instructies</h3></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.2. Stap-voor-stap installatie instructies</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Stap-voor-stap gebruiks instructies" /></head><body class="toc_embeded "><div id="to
 cdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.2. Stap-voor-stap installatie instructies" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions"><div class="titlepage"><div><div keep-together.within-column="al
 ways"><h3 class="title">3.8.2. Stap-voor-stap installatie instructies</h3></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					Open a Terminal: <code class="code">Click ''Applications'' -&gt; ''System Tools'' -&gt; ''Terminal''</code>
 				</div></li><li class="listitem"><div class="para">
 					Installeer 7-Zip met sudo toegang: <code class="code">sudo yum install p7zip</code>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html
index 3d616d9..0d04f2e 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.4. Merk op</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Stap-voor-stap gebruiks instructies" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" cl
 ass="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.4. Merk op" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.8.4. Merk op</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.4. Merk op</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Stap-voor-stap gebruiks instructies" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe"
  class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.4. Merk op" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.8.4. Merk op</h3></div></div></div><div class="para">
 			7-Zip wordt niet standaard verstuurd met Microsoft Windows of Mac OS X. Als je jouw 7-Zip bestanden op die platformen moet gebruiken, moet je de juiste versie van 7-Zip op die computers installeren. Zie de 7-Zip <a href="http://www.7-zip.org/download.html">download pagina</a>.
 		</div><div class="para">
 			GNOME's File Roller application will recognize your .7z files and attempt to open them, but it will fail with the error "''An error occurred while loading the archive.''" when it attempts to do so. This is because File Roller does not currently support the extraction of encrypted 7-Zip files. A bug report ([http://bugzilla.gnome.org/show_bug.cgi?id=490732 Gnome Bug 490732]) has been submitted.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html
index 8354da8..8081c97 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.3. Stap-voor-stap gebruiks instructies</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Stap-voor-stap installatie instructies" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Merk op" /></head><body class="toc_embeded "><div id="to
 cdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.3. Stap-voor-stap gebruiks instructies" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions"><div class="titlepage"><div><div keep-together.withi
 n-column="always"><h3 class="title">3.8.3. Stap-voor-stap gebruiks instructies</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8.3. Stap-voor-stap gebruiks instructies</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Stap-voor-stap installatie instructies" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Merk op" /></head><body class="toc_embeded "><div id=
 "tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.3. Stap-voor-stap gebruiks instructies" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions"><div class="titlepage"><div><div keep-together.wi
 thin-column="always"><h3 class="title">3.8.3. Stap-voor-stap gebruiks instructies</h3></div></div></div><div class="para">
 			By following these instructions you are going to compress and encrypt your "Documents" directory. Your original "Documents" directory will remain unaltered. This technique can be applied to any directory or file you have access to on the filesystem.
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					Open a Terminal:<code class="code">Click ''Applications'' -&gt; ''System Tools'' -&gt; ''Terminal''</code>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html
index bdc1fa2..ced96cc 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8. 7-Zip versleutelde archieven</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Interessante verwijzingen" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Stap-voor-stap installatie instructies" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfr
 ame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.8. 7-Zip versleutelde archieven" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.8. 7-Zi
 p versleutelde archieven</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.8. 7-Zip versleutelde archieven</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Interessante verwijzingen" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Stap-voor-stap installatie instructies" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="to
 cframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.8. 7-Zip versleutelde archieven" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.8. 7
 -Zip versleutelde archieven</h2></div></div></div><div class="para">
 		<a href="http://www.7-zip.org/">7-Zip</a> is een, op meerdere platforms beschikbaar en van de volgende generatie, bestandscompressie gereedschap dat ook een sterke versleuteling (AES-256) kan gebruiken om de inhoud van het archief te beschermen. Dit is bijzonder nuttig als je data moet verplaatsen tussen meerdere computers die verschillende operating systemen draaien (b.v. Linux thuis, Windows op het werk) en je zoekt hiervoor naar een overdraagbare versleutelings oplossing.
 	</div><div class="section" title="3.8.1. 7-Zip installatie in Fedora" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.8.1. 7-Zip installatie in Fedora</h3></div></div></div><div class="para">
 			7-Zip is niet een standaard geïnstalleerd pakket in Fedora, maar het is beschikbaar in de software repository. Zodra het pakket geïnstalleerd is zal het samen met rest van de software op het systeem vernieuwd worden zonder dat daar speciale aandacht voor nodig is.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html
index db35dc3..0450bb8 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.2. Volledige schijf versleuteling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="next" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Bestand gebaseerde versleuteling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This i
 s an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.2. Volledige schijf versleuteling" id="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.2. Volledige schijf versleuteling</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.2. Volledige schijf versleuteling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="next" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Bestand gebaseerde versleuteling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">Thi
 s is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.2. Volledige schijf versleuteling" id="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.2. Volledige schijf versleuteling</h2></div></div></div><div class="para">
 			Full disk or partition encryption is one of the best ways of protecting your data. Not only is each file protected but also the temporary storage that may contain parts of these files is also protected. Full disk encryption will protect all of your files so you don't have to worry about selecting what you want to protect and possibly missing a file.
 		</div><div class="para">
 			Fedora 9, en later, ondersteunt ingebouwde LUKS versleuteling. LUKS zal je gehele harde schijf partities versleutelen zodat je date beschermd is als de computer uit staat. Dit zal je computer ook beschermen tegen aanvallers die proberen in enkele-gebruikers mode in te loggen op je computer of op een andere manier toegang krijgen.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html
index 107ae63..ee16b39 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.4. Over publieke sleutel versleuteling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Het maken van GPG sleutels met de commandoregel" /><link rel="next" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Hoofdstuk 4. Algemene principes van informatie beveiliging" /></head><body class="toc_
 embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.4. Over publieke sleutel versleuteling" id="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption"><div class="titlepage"><div><div keep-together.within-column=
 "always"><h3 class="title">3.9.4. Over publieke sleutel versleuteling</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.4. Over publieke sleutel versleuteling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Het maken van GPG sleutels met de commandoregel" /><link rel="next" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Hoofdstuk 4. Algemene principes van informatie beveiliging" /></head><body class="t
 oc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.4. Over publieke sleutel versleuteling" id="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption"><div class="titlepage"><div><div keep-together.within-colu
 mn="always"><h3 class="title">3.9.4. Over publieke sleutel versleuteling</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					<a href="http://en.wikipedia.org/wiki/Public-key_cryptography">Wikipedia - Public Key Cryptography</a>
 				</div></li><li class="listitem"><div class="para">
 					<a href="http://computer.howstuffworks.com/encryption.htm">HowStuffWorks - Encryption</a>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html
index 6637d0b..d03d118 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.3. Het maken van GPG sleutels met de commandoregel</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Het maken van GPG sleutels in KDE" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Over publieke sleutel versleuteling" /></head><body class="toc_embeded "><
 div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.3. Het maken van GPG sleutels met de commandoregel" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE"><div class="titlepage"><div><div keep-together.within-co
 lumn="always"><h3 class="title">3.9.3. Het maken van GPG sleutels met de commandoregel</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.3. Het maken van GPG sleutels met de commandoregel</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Het maken van GPG sleutels in KDE" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Over publieke sleutel versleuteling" /></head><body class="toc_embeded 
 "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.3. Het maken van GPG sleutels met de commandoregel" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE"><div class="titlepage"><div><div keep-together.within
 -column="always"><h3 class="title">3.9.3. Het maken van GPG sleutels met de commandoregel</h3></div></div></div><div class="para">
 			Gebruik het volgende shell commando: <code class="code">gpg --gen-key</code>
 		</div><div class="para">
 			Dit commando genereert een sleutelpaar dat bestaat uit een publieke en een privé sleutel. Anderen gebruiken jouw publieke sleutel voor authenticatie en/of ontsleutelen van je communicatie. Verspreid je publieke sleutel zo breed mogelijk, in het bijzonder naar mensen waarvan je weet dat ze autentieke communicatie van jou willen ontvangen, zoals een emaillijst. Het Fedora Documentation Project, bijvoorbeeld, vraagt deelnemers om een publieke GPG sleutel toe te voegen aan hun zelf-introductie.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html
index 4f31fac..fd92c12 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.2. Het maken van GPG sleutels in KDE</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Het maken van GPG sleutels met de commandoregel" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><if
 rame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.2. Het maken van GPG sleutels in KDE" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.9.2. Het maken van GPG sleutels in KDE<
 /h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9.2. Het maken van GPG sleutels in KDE</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Het maken van GPG sleutels met de commandoregel" /></head><body class="toc_embeded "><div id="tocdiv" class="toc">
 <iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.2. Het maken van GPG sleutels in KDE" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.9.2. Het maken van GPG sleutels in K
 DE</h3></div></div></div><div class="para">
 			Start the KGpg program from the main menu by selecting Applications &gt; Utilities &gt; Encryption Tool. If you have never used KGpg before, the program walks you through the process of creating your own GPG keypair. A dialog box appears prompting you to create a new key pair. Enter your name, email address, and an optional comment. You can also choose an expiration time for your key, as well as the key strength (number of bits) and algorithms. The next dialog box prompts you for your passphrase. At this point, your key appears in the main <code class="code">KGpg</code> window.
 		</div><div class="warning"><h2>Waarschuwing</h2><div class="para">
 				Als je jouw wachtzin vergeet, kan de sleutel niet gebruikt worden en allee data die versleuteld wordt met die sleutel is verloren.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG.html
index 450a33b..c5fb527 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Encryption-Using_GPG.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9. GNU Privacy Guard (GnuPG) gebruiken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Merk op" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Het maken van GPG sleutels in KDE" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" sr
 c="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" id="sect-Security_Guide-Encryption-Using_GPG" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.9. GNU Privacy Guard (GnuPG) gebruike
 n</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.9. GNU Privacy Guard (GnuPG) gebruiken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Merk op" /><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Het maken van GPG sleutels in KDE" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc"
  src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.9. GNU Privacy Guard (GnuPG) gebruiken" id="sect-Security_Guide-Encryption-Using_GPG" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.9. GNU Privacy Guard (GnuPG) gebru
 iken</h2></div></div></div><div class="para">
 		GPG is used to identify yourself and authenticate your communications, including those with people you don't know. GPG allows anyone reading a GPG-signed email to verify its authenticity. In other words, GPG allows someone to be reasonably certain that communications signed by you actually are from you. GPG is useful because it helps prevent third parties from altering code or intercepting conversations and altering the message.
 	</div><div class="section" title="3.9.1. Het maken van GPG sleutels in GNOME" id="sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.9.1. Het maken van GPG sleutels in GNOME</h3></div></div></div><div class="para">
 			Install the Seahorse utility, which makes GPG key management easier. From the main menu, select <code class="code">System &gt; Administration &gt; Add/Remove Software</code> and wait for PackageKit to start. Enter <code class="code">Seahorse</code> into the text box and select the Find. Select the checkbox next to the ''seahorse'' package and select ''Apply'' to add the software. You can also install <code class="code">Seahorse</code> at the command line with the command <code class="code">su -c "yum install seahorse"</code>.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html
index f6f79cd..5bfdc5f 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.5. Anticiperen op je toekomstige behoeftes</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD de scanner" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifr
 ame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.5. Anticiperen op je toekomstige behoeftes" id="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.5. Anticiperen op je t
 oekomstige behoeftes</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.5. Anticiperen op je toekomstige behoeftes</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD de scanner" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><
 iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.5. Anticiperen op je toekomstige behoeftes" id="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.5. Anticiperen op j
 e toekomstige behoeftes</h4></div></div></div><div class="para">
 				Afhankelijk van je doel en hulpmiddelen, zijn er veel gereedschappen beschikbaar. Er zijn gereedschappen voor draadloze netwerken, Novell netwerken, Windows systemen, Linux systemen, een nog veel meer. Een ander essentieel onderdeel van het uitvoeren van onderzoeken kan zijn het bekijken van fysieke beveiliging, personeel doorlichten, of voice/PBX netwerk beoordeling. Nieuwe concepten, zoals <em class="firstterm">war walking</em>, wat het scannen van de omtrek van de fysieke structuur van je onderneming inhoudt voor draadloze netwerk kwetsbaarheden, zijn opkomende concepten die je kunt bekijken en, indien nodig, onderdeel maken van je onderzoek. Verbeelding en blootstelling zijn de enigste beperkingen voor het plannen en uitvoeren van kwetsbaarheidsonderzoeken.
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Terug</strong>1.2.3.4. VLAD de scanner</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Volgende</strong>1.3. Aanvallers en kwetsbaarheden</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nessus.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nessus.html
index e49f4e2..deb8876 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nessus.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nessus.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.2. Nessus</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc"
  src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.2. Nessus" id="sect-Security_Guide-Evaluating_the_Tools-Nessus"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.2. Nessus</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.2. Nessus</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="t
 oc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.2. Nessus" id="sect-Security_Guide-Evaluating_the_Tools-Nessus"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.2. Nessus</h4></div></div></div><div class="para">
 				Nessus is een beveiligings scanner voor alle services. De plug-in architectuur van Nessus staat gebruikers toe het aan te passen voor hun systemen en netwerken. Zoals met elke scanner is Nessus niet beter dan de handtekeningen database waar het op steunt. Gelukkig wordt Nessus regelmatig vernieuwd en biedt het volledige rapportering, en real-time kwetsbaarheid zoeken. Denk er aan dat er verkeerde plussen en verkeerde minnen kunnen zijn, zelfs bij een gereedschap zo krachtig en regelmatig vernieuwd als Nessus.
 			</div><div class="note"><h2>Opmerking</h2><div class="para">
 					De Nessus cliënt en server software is onderdeel van Fedora in de repositories maar vereist een abonnement om te gebruiken. Het wordt in dit document genoemd als een referentie voor gebruikers die er interesse in hebben om deze populaire toepassing te gebruiken.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nikto.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nikto.html
index c84a2fc..9ab0379 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nikto.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-Nikto.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.3. Nikto</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD de scanner" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.htm
 l">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.3. Nikto" id="sect-Security_Guide-Evaluating_the_Tools-Nikto"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.3. Nikto</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.3. Nikto</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD de scanner" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.
 html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.3. Nikto" id="sect-Security_Guide-Evaluating_the_Tools-Nikto"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.3. Nikto</h4></div></div></div><div class="para">
 				Nikto een zeer goede common gateway interface (CGI) script scanner. Nikto controleert niet alleen voor CGI kwetsbaarheden maar doet dit op een ontwijkende manier zodat het ontsnapt aan indringings detectie systemen. Het heeft een grondige documentatie die je zorgvuldig moet bekijken voordat je het programma draait. Als je Web servers hebt die CGI scripts aanbieden, kan Nikto een uitstekende hulpbron zijn om de beveiliging van deze servers te controleren.
 			</div><div class="para">
 				Meer informatie over Nikto kan gevonden worden op:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html
index f3eef1f..ec11603 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.4. VLAD de scanner</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticiperen op je toekomstige behoeftes" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="
 tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.4. VLAD de scanner" id="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.4. VLAD de scanner</h4></div></div></div><div class="para
 ">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3.4. VLAD de scanner</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticiperen op je toekomstige behoeftes" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe i
 d="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.4. VLAD de scanner" id="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.4. VLAD de scanner</h4></div></div></div><div class="p
 ara">
 				VLAD is een kwetsbaarheids scanner, ontwikkelt door het <acronym class="acronym">RAZOR</acronym> team van Bindview, Inc., welke controleert voor de SANS Top Tien lijst van algemene beveiligings problemen (SNMP problemen, bestandsdeling problemen, enz.). Hoewel het niet zo volledig is als Nessus, is VLAD de moeite van het bekijken waard.
 			</div><div class="note"><h2>Opmerking</h2><div class="para">
 					VLAD is geen onderdeel van Fedora en wordt niet ondersteund. Het wordt in dit document genoemd als een referentie voor gebruikers die er interesse in hebben om deze populaire toepassing te gebruiken.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html
index 1db5c5e..28d4228 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5.3. DMZ's en IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels" /><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Prerouting" /><link rel="next" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Kwaadwillige software en bedrogen IP adressen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe"
  class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5.3. DMZ's en IPTables" id="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.5.3. DMZ's en IPTables</h4></div></div></div><div class=
 "para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5.3. DMZ's en IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels" /><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Prerouting" /><link rel="next" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Kwaadwillige software en bedrogen IP adressen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfra
 me" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5.3. DMZ's en IPTables" id="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.5.3. DMZ's en IPTables</h4></div></div></div><div cla
 ss="para">
 				Je kunt <code class="command">iptables</code> regels maken om verkeer naar een bepaalde machine, zoals een specifieke HTTP of FTP server, te sturen in een <em class="firstterm">demilitarized zone</em> (<acronym class="acronym">DMZ</acronym>). Een <acronym class="acronym">DMZ</acronym> is een speciaal lokaal subnetwerk bestemd om services op een publieke drager (zoals het Internet) aan te bieden.
 			</div><div class="para">
 				Bijvoorbeeld, om een regel te maken om binnenkomende HTTP verzoeken door te sturen naar een specifieke HTTP server op 10.0.4.2 (buiten de 192.168.1.0/24 reeks van het LAN), gebruikt NAT de <code class="computeroutput">PREROUTING</code> tabel om de pakketten door te sturen naar de juiste bestemming:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html
index 38daa3e..21ce560 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5.2. Prerouting</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels" /><link rel="prev" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels" /><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. DMZ's en IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html"
 >This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5.2. Prerouting" id="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.5.2. Prerouting</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5.2. Prerouting</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels" /><link rel="prev" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels" /><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. DMZ's en IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.ht
 ml">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5.2. Prerouting" id="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.5.2. Prerouting</h4></div></div></div><div class="para">
 				Als je een server in je interne netwerk hebt die je extern beschikbaar wilt maken, kun je het <code class="option">-j DNAT</code> doel van de PREROUTING keten in NAT gebruiken om een bestemmings IP adres en poort te specificeren waarnaar binnenkomende pakketten die een verbinding verzoeken naar je interne service geforward kunnen worden.
 			</div><div class="para">
 				Bijvoorbeeld, als je binnenkomende HTTP verzoeken wilt forwarden naar je specifieke Apache HTTP server op 172.31.0.23, gebruik je het volgende commando:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Additional_Resources.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Additional_Resources.html
index 4596002..88a1b5c 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Additional_Resources.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Additional_Resources.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9. Extra hulpbronnen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Nuttige firewall websites" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser
  or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9. Extra hulpbronnen" id="sect-Security_Guide-Firewalls-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.9. Extra hulpbronnen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.9. Extra hulpbronnen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Nuttige firewall websites" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your brow
 ser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9. Extra hulpbronnen" id="sect-Security_Guide-Firewalls-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.9. Extra hulpbronnen</h3></div></div></div><div class="para">
 			Er zijn verscheidene aspecten van firewalls en het Linux Netfilter subsysteem die in dit hoofdstuk niet behandeld konden worden. Voor meer informatie refereer je naar de volgende hulpbronnen.
 		</div><div class="section" title="2.8.9.1. geïnstalleerde firewall documentatie" id="sect-Security_Guide-Additional_Resources-Installed_Firewall_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.9.1. geïnstalleerde firewall documentatie</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Refer to <a class="xref" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables">Paragraaf 2.9, “IPTables”</a> for more detailed information on the <code class="command">iptables</code> command, including definitions for many command options.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html
index 082f394..2eb3293 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2. Basis firewall instelling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Het aan- en uitzetten van de firewall" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an if
 rame, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2. Basis firewall instelling" id="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.2. Basis firewall instelling</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.2. Basis firewall instelling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Het aan- en uitzetten van de firewall" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an
  iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2. Basis firewall instelling" id="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.2. Basis firewall instelling</h3></div></div></div><div class="para">
 			Net zoals een firewall in een gebouw probeert te voorkomen dat het vuur zich verspreidt, probeert een computer firewall te voorkomen dat kwaadwillige software zich verspreidt naar je computer. Het helpt ook om niet gemachtigde gebruikers toegang tot je computer te beletten.
 		</div><div class="para">
 			In een standaard Fedora installatie is er een firewall tussen jouw computer of netwerk en alle niet vertrouwde netwerken, bijvoorbeeld het Internet. Het bepaalt tot welke services op jouw computer gebruikers op afstand toegang kunnen hebben. Een juist ingestelde firewall kan de beveiliging van je systeem sterk verbeteren. Het wordt aanbevolen dat je een firewall instelt voor elk Fedora systeem met een Internet verbinding.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html
index 216f7da..5f10fca 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.4. Algemene IPTables filtering</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Opslaan en terugzetten van IPTables regels" /><link rel="next" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../
 ../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.4. Algemene IPTables filtering" id="sect-Security_Guide-Firewalls-Common_IPTables_Filtering"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.4. Algemene IPTables filtering</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.4. Algemene IPTables filtering</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Opslaan en terugzetten van IPTables regels" /><link rel="next" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../
 ../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.4. Algemene IPTables filtering" id="sect-Security_Guide-Firewalls-Common_IPTables_Filtering"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.4. Algemene IPTables filtering</h3></div></div></div><div class="para">
 			Een van de belangrijkste aspecten van netwerkbeveiliging is het voorkomen dat aanvallers op afstand toegang krijgen tot een LAN. De integriteit van een LAN moet beschermd worden tegen kwaadwillige gebruikers door het gebruik van strenge firewall regels.
 		</div><div class="para">
 			Met een standaard tactiek om alle binnenkomende, uitgaande, een doorgestuurde pakketten te blokkeren, is het echter onmogelijk voor de firewall/gateway en interne LAN gebruikers om met elkaar of met externe hulpbronnen te communiceren.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html
index 4e7b3b1..a6336be 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5. FORWARD en NAT regels</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Algemene IPTables filtering" /><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Prerouting" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it 
 upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5. FORWARD en NAT regels" id="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.5. FORWARD en NAT regels</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Algemene IPTables filtering" /><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Prerouting" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view 
 it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5. FORWARD en NAT regels" id="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</h3></div></div></div><div class="para">
 			De meeste ISP's bieden slechts een beperkt aantal publiek bereikbare IP adressen aan de organisaties die ze bedienen.
 		</div><div class="para">
 			Beheerders moeten daarom een alternatieve manier vinden om toegang tot Internet services te delen zonder aan iedere node op het LAN een publiek IP adres te geven.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html
index 39becaa..61f1d41 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.7. IPTables en verbindingen volgen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Kwaadwillige software en bedrogen IP adressen" /><link rel="next" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an
  iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.7. IPTables en verbindingen volgen" id="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.7. IPTables en verbindingen volgen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.7. IPTables en verbindingen volgen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Kwaadwillige software en bedrogen IP adressen" /><link rel="next" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is
  an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.7. IPTables en verbindingen volgen" id="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.7. IPTables en verbindingen volgen</h3></div></div></div><div class="para">
 			Je kunt verbindingen naar services inspecteren en beperken gebaseerd op hun <em class="firstterm">verbindingstoestand</em>. Een module binnen <code class="command">iptables</code> gebruikt een methode, <em class="firstterm">verbindingen volgen</em> genaamd, om informatie op te slaan over binnenkomende verbindingen. Je kunt toegang toestaan of weigeren op basis van de volgende verbindingstoestanden:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="option">NEW</code> — Een pakket verzoekt een nieuwe verbinding, zoals een HTTP verzoek.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPv6.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPv6.html
index 63a720f..31b338e 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPv6.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-IPv6.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.8. IPv6</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables en verbindingen volgen" /><link rel="next" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upg
 rade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.8. IPv6" id="sect-Security_Guide-Firewalls-IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.8. IPv6</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.8. IPv6</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables en verbindingen volgen" /><link rel="next" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it 
 upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.8. IPv6" id="sect-Security_Guide-Firewalls-IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.8. IPv6</h3></div></div></div><div class="para">
 			De introductie van het volgende generatie Internet protocol met de naam IPv6, gaat boven de 32-bit adres limiet van IPv4 (of IP). IPv6 ondersteunt 128-bit adressen, en vervoersnetwerken die bewust zijn van IPv6 kunnen daarom een groter aantal adressen aan dan IPv4.
 		</div><div class="para">
 			Fedora ondersteunt IPv6 firewall regels door gebruik van het Netfilter 6 subsysteem en het <code class="command">ip6tables</code> commando. In Fedora 11 zijn standaard zowel IPv4 als IPv6 services aangezet.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html
index 65ab2f1..4f89b55 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.6. Kwaadwillige software en bedrogen IP adressen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. DMZ's en IPTables" /><link rel="next" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables en verbindingen volgen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../
 ../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.6. Kwaadwillige software en bedrogen IP adressen" id="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.6. Kwaadwillige software en bedrogen IP a
 dressen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.6. Kwaadwillige software en bedrogen IP adressen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. DMZ's en IPTables" /><link rel="next" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables en verbindingen volgen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="
 ../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.6. Kwaadwillige software en bedrogen IP adressen" id="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.6. Kwaadwillige software en bedrogen I
 P adressen</h3></div></div></div><div class="para">
 			Uitgebreidere regels kunnen gemaakt worden om toegang te controleren naar specifieke subnetten, of zelfs specifieke nodes, binnen een LAN. Je kunt ook bepaalde verdachte toepassingen of programma's zoals, trojans, wormen, en andere cliënt/server virussen beperken om contact op te nemen met hun server.
 		</div><div class="para">
 			Bijvoorbeeld, sommige trojans scannen netwerken voor services op poorten van 31337 tot 31340 (de <span class="emphasis"><em>elite</em></span> poorten genoemd in krakers terminologie).
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Using_IPTables.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Using_IPTables.html
index 33269a8..7d3566f 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Using_IPTables.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls-Using_IPTables.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3. IPTables gebruiken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Het activeren van de IPTables service" /><link rel="next" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Basis firewall tactieken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src
 ="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3. IPTables gebruiken" id="sect-Security_Guide-Firewalls-Using_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.3. IPTables gebruiken</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3. IPTables gebruiken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Het activeren van de IPTables service" /><link rel="next" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Basis firewall tactieken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" 
 src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3. IPTables gebruiken" id="sect-Security_Guide-Firewalls-Using_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.8.3. IPTables gebruiken</h3></div></div></div><div class="para">
 			De eerste stap voor het gebruik van <code class="command">iptables</code> is om de <code class="command">iptables</code> service te starten. Gebruik het volgende commando om de <code class="command">iptables</code> service te starten:
 		</div><pre class="screen">[root at myServer ~] # service iptables start
 </pre><div class="note"><h2>Opmerking</h2><div class="para">
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls.html
index ffdacff..e5aadb6 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Firewalls.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8. Firewalls</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html" title="2.7.8. Het starten en stoppen van een IPsec verbinding" /><link rel="next" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc
 "><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.8. Firewalls" id="sect-Security_Guide-Firewalls" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.8. Firewalls</h2></div>
 </div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8. Firewalls</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html" title="2.7.8. Het starten en stoppen van een IPsec verbinding" /><link rel="next" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling" /></head><body class="toc_embeded "><div id="tocdiv" class="
 toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.8. Firewalls" id="sect-Security_Guide-Firewalls" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.8. Firewalls</h2></d
 iv></div></div><div class="para">
 		Informatie beveiliging wordt meestal beschouwd als een proces en niet als een product. Standaard beveiligings implementaties gebruiken gewoonlijk echter een specifiek mechanisme om de toegangsrechten te controleren en netwerkhulpbronnen te beperken tot gebruikers die gemachtigd, identificeerbaar en traceerbaar zijn. Fedora bevat verscheidene gereedschappen om beheerders en beveiligings ingenieurs te helpen met toegangscontrole zaken op netwerk niveau.
 	</div><div class="para">
 		Firewalls zijn een van de kernonderdelen van een netwerkbeveiligings implementatie. Verscheidene leveranciers brengen firewall oplossingen op de markt die zich richten op alle niveau's van de markt: van thuisgebruikers die een PC beschermen tot datacentrum oplossingen die vitale bedrijfsinformatie beschermen. Firewalls kunnen op zichzelf staande hardware oplossingen zijn, zoals firewall apparaten van Cisco, Nokia, en Sonicwall. Leveranciers zoals Checkpoint, McAfee, en Symantec hebben ook eigendomsmatige software firewall oplossingen ontwikkeld voor thuis en zakelijke markten.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Additional_Resources.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Additional_Resources.html
index 97b7616..5c20797 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Additional_Resources.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Additional_Resources.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.7. Extra hulpbronnen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.6. IPTables en IPv6" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.7.2. Nuttige IPTables websites" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view 
 it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.7. Extra hulpbronnen" id="sect-Security_Guide-IPTables-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.7. Extra hulpbronnen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.7. Extra hulpbronnen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.6. IPTables en IPv6" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.7.2. Nuttige IPTables websites" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to vi
 ew it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.7. Extra hulpbronnen" id="sect-Security_Guide-IPTables-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.7. Extra hulpbronnen</h3></div></div></div><div class="para">
 			Refereer naar de volgende bronnen voor meer informatie over pakket filtering met <code class="command">iptables</code>.
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<a class="xref" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls">Paragraaf 2.8, “Firewalls”</a> — Contains a chapter about the role of firewalls within an overall security strategy as well as strategies for constructing firewall rules.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Command_Options_for_IPTables.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Command_Options_for_IPTables.html
index ac44c8d..feb675a 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Command_Options_for_IPTables.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Command_Options_for_IPTables.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3. Commando opties voor IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html" title="2.9.2. Verschillen tussen IPTables en IPChains" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.3.2. Commando opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="..
 /../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3. Commando opties voor IPTables" id="sect-Security_Guide-IPTables-Command_Options_for_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.3. Commando opties voor IPTables</h3></div></div></div><div
  class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3. Commando opties voor IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html" title="2.9.2. Verschillen tussen IPTables en IPChains" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.3.2. Commando opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src=
 "../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3. Commando opties voor IPTables" id="sect-Security_Guide-IPTables-Command_Options_for_IPTables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.3. Commando opties voor IPTables</h3></div></div></div><
 div class="para">
 			Regels voor het filteren van pakketten worden gemaakt met behulp van het <code class="command">iptables</code> commando. De volgende aspecten van het pakket worden het meest als criteria:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<span class="emphasis"><em>Pakket type</em></span> — Specificeert het type van de pakketten die het commando filtert.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html
index 795d1e4..99980de 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.2. Verschillen tussen IPTables en IPChains</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="next" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade yo
 ur browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2. Verschillen tussen IPTables en IPChains" id="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.2. Verschillen tussen IPTables en IPChains</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.2. Verschillen tussen IPTables en IPChains</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="next" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.3. Commando opties voor IPTables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade
  your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2. Verschillen tussen IPTables en IPChains" id="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.2. Verschillen tussen IPTables en IPChains</h3></div></div></div><div class="para">
 			Zowel <code class="command">ipchains</code> als <code class="command">iptables</code> gebruiken ketens van regels die binnen de Linux kernel werken om pakketten te filteren gebaseerd op het overeenkomen met opgegeven regels of regelstelsels. <code class="command">iptables</code> biedt echter een uitgebreidere manier om pakketten te filteren, wat de beheerder meer controle geeft zonder dat overmatige complexiteit in het systeem ingebouwd wordt.
 		</div><div class="para">
 			Je moet bedacht zijn op de volgende belangrijke verschillen tussen <code class="command">ipchains</code> en <code class="command">iptables</code>:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_Control_Scripts.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_Control_Scripts.html
index 3e4900b..1393170 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_Control_Scripts.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_Control_Scripts.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.5. IPTables controle scripts</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.4. Het opslaan van IPTables regels" /><link rel="next" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.6. IPTables en IPv6" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it u
 pgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.5. IPTables controle scripts" id="sect-Security_Guide-IPTables-IPTables_Control_Scripts"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.5. IPTables controle scripts</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.5. IPTables controle scripts</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.4. Het opslaan van IPTables regels" /><link rel="next" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.6. IPTables en IPv6" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view i
 t upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.5. IPTables controle scripts" id="sect-Security_Guide-IPTables-IPTables_Control_Scripts"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.5. IPTables controle scripts</h3></div></div></div><div class="para">
 			Er zijn twee basis methodes voor het controleren van <code class="command">iptables</code> in Fedora:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<span class="application"><strong>Firewall Configuration Tool</strong></span> (<code class="command">system-config-securitylevel</code>) — A graphical interface for creating, activating, and saving basic firewall rules. Refer to <a class="xref" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling">Paragraaf 2.8.2, “Basis firewall instelling”</a> for more information.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_and_IPv6.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_and_IPv6.html
index cfefe5a..017ab2a 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_and_IPv6.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-IPTables_and_IPv6.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.6. IPTables en IPv6</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.5. IPTables controle scripts" /><link rel="next" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Extra hulpbronnen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade y
 our browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.6. IPTables en IPv6" id="sect-Security_Guide-IPTables-IPTables_and_IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.6. IPTables en IPv6</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.6. IPTables en IPv6</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.5. IPTables controle scripts" /><link rel="next" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.7. Extra hulpbronnen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrad
 e your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.6. IPTables en IPv6" id="sect-Security_Guide-IPTables-IPTables_and_IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.6. IPTables en IPv6</h3></div></div></div><div class="para">
 			Als het <code class="filename">iptables-ipv6</code> pakket geïnstalleerd is, kan netfilter in Fedora het volgende generatie IPv6 Internet protocol filteren. Het commando dat gebruikt wordt om het IPv6 netfilter te manipuleren is <code class="command">ip6tables</code>.
 		</div><div class="para">
 			De meeste instructies zijn identiek aan degene die gebruikt worden voor <code class="command">iptables</code>, behalve dat de <code class="command">nat</code> nog niet ondersteund wordt. Dit betekent dat het nog niet mogelijk is om IPv6 netwerk adres vertalings taken uit te voeren, zoals vermomming en poort forwarding.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Saving_IPTables_Rules.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Saving_IPTables_Rules.html
index 7993449..3d83f01 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Saving_IPTables_Rules.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables-Saving_IPTables_Rules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.4. Het opslaan van IPTables regels</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.3.6. Lijst opties" /><link rel="next" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.5. IPTables controle scripts" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an i
 frame, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.4. Het opslaan van IPTables regels" id="sect-Security_Guide-IPTables-Saving_IPTables_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.4. Het opslaan van IPTables regels</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.4. Het opslaan van IPTables regels</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.3.6. Lijst opties" /><link rel="next" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.5. IPTables controle scripts" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is a
 n iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.4. Het opslaan van IPTables regels" id="sect-Security_Guide-IPTables-Saving_IPTables_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.9.4. Het opslaan van IPTables regels</h3></div></div></div><div class="para">
 			Regels die gemaakt worden met het <code class="command">iptables</code> commando worden opgeslagen in het geheugen. Als het systeem opnieuw opgestart wordt voordat de <code class="command">iptables</code> regels opgeslagen worden, gaan alle regels verloren. Om netfilter regels bestand te laten zijn tegen een systeem opstart, moeten ze opgeslagen worden. Om netfilter regels op te slaan, type je het volgende commando als root:
 		</div><pre class="screen"><code class="command"> /sbin/service iptables save </code>
 </pre><div class="para">
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables.html
index 9056d35..de994c1 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9. IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Gerelateerde documentatie" /><link rel="next" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html" title="2.9.2. Verschillen tussen IPTables en IPChains" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" 
 class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.9. IPTables" id="sect-Security_Guide-IPTables" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.9. IPTables</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9. IPTables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Gerelateerde documentatie" /><link rel="next" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html" title="2.9.2. Verschillen tussen IPTables en IPChains" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfram
 e" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.9. IPTables" id="sect-Security_Guide-IPTables" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.9. IPTables</h2></div></div></div><div class="para">
 		Onderdeel van Fedora zijn geavanceerde gereedschappen voor netwerk <em class="firstterm">pakket filtering</em> — het proces van het controleren van netwerkpakketten tijdens het binnenkomen, doorlopen, en verlaten van de netwerkstack in de kernel. Kernel versies voor 2.4 vertrouwden op <code class="command">ipchains</code> voor pakket filtering en gebruikten lijsten met regels toe toegepast werden voor pakketten in iedere stap van het filter proces. De 2.4 kernel introduceerde <code class="command">iptables</code> (ook <em class="firstterm">netfilter</em> genaamd), welke overeenkomt met <code class="command">ipchains</code> maar die het bereik en de controle beschikbaar voor het filteren van netwerk pakketten verder uitbreidt.
 	</div><div class="para">
 		Dit hoofdstuk richt zich op de pakket filtering basis eigenschappen, definieert de verschillen tussen <code class="command">ipchains</code> en <code class="command">iptables</code>, legt verschillende opties beschikbaar voor <code class="command">iptables</code> commando's uit, en legt uit hoe filter regels behouden kunnen blijven als het systeem opnieuw opstart.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html
index 1264e92..9e6a0fd 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.4. Extra overeenkomst optie modules</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. IPTables overeenkomst opties" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.3.4.3. ICMP protocol" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.3.5. Doel opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe 
 id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.4.4. Extra overeenkomst optie modules" id="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.9.3.4.4. Extra over
 eenkomst optie modules</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.4. Extra overeenkomst optie modules</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. IPTables overeenkomst opties" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.3.4.3. ICMP protocol" /><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.3.5. Doel opties" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifra
 me id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.4.4. Extra overeenkomst optie modules" id="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.9.3.4.4. Extra o
 vereenkomst optie modules</h5></div></div></div><div class="para">
 					Extra overeenkomst opties zijn beschikbaar met modules die geladen worden door het <code class="command">iptables</code> commando.
 				</div><div class="para">
 					To use a match option module, load the module by name using the <code class="option">-m <em class="replaceable"><code>&lt;module-name&gt;</code></em></code>, where <em class="replaceable"><code>&lt;module-name&gt;</code></em> is the name of the module.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html
index 581de6b..a5ea79b 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.3. ICMP protocol</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. IPTables overeenkomst opties" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.3.4.2. UDP protocol" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.3.4.4. Extra overeenkomst optie modules" /></head><body class="toc_embeded "><div id="tocdiv" class="
 toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.4.3. ICMP protocol" id="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.9.3.4.3. ICMP protocol</h5></div>
 </div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.3. ICMP protocol</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. IPTables overeenkomst opties" /><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.3.4.2. UDP protocol" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.3.4.4. Extra overeenkomst optie modules" /></head><body class="toc_embeded "><div id="tocdiv" clas
 s="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.4.3. ICMP protocol" id="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.9.3.4.3. ICMP protocol</h5></d
 iv></div></div><div class="para">
 					De volgende overeenkomst opties zijn beschikbaar voor het Internet Control Message Protocol (ICMP) (<code class="option">-p icmp</code>):
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="option">--icmp-type</code> — Stelt de naam of het nummer in van het IMCP type die overeen moet komen met de regel. Een lijst van geldige IMCP namen kan verkregen worden door het <code class="command">iptables -p icmp -h</code> commando in te typen.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html
index 83bd9f9..34c6619 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.2. UDP protocol</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. IPTables overeenkomst opties" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. IPTables overeenkomst opties" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.3.4.3. ICMP protocol" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><if
 rame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.4.2. UDP protocol" id="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.9.3.4.2. UDP protocol</h5></div></div></div><
 div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.9.3.4.2. UDP protocol</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. IPTables overeenkomst opties" /><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.3.4. IPTables overeenkomst opties" /><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.3.4.3. ICMP protocol" /></head><body class="toc_embeded "><div id="tocdiv" class="toc">
 <iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3.4.2. UDP protocol" id="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.9.3.4.2. UDP protocol</h5></div></div></di
 v><div class="para">
 					De volgende overeenkomst opties zijn beschikbaar voor het UDP protocol (<code class="option">-p udp</code>):
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="option">--dport</code> — Specificeert de bestemmingspoort voor het UDP pakket met gebruik van de service naam, poortnummer, of reeks van poortnummers. De <code class="option">--destination-port</code> overeenkomst optie is synoniem met <code class="option">--dport</code>.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html
index 312f94d..4e68e52 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.6.2. Handmatige IPsec host-naar-host configuratie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.
 7. IPsec netwerk-naar-netwerk configuratie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie" id="sect-Se
 curity_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.7.6.2. Handmatige <abbr class="abbrev">IPsec</abbr> host-naar-host configuratie</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.6.2. Handmatige IPsec host-naar-host configuratie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2
 .7.7. IPsec netwerk-naar-netwerk configuratie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie" id="sect
 -Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.7.6.2. Handmatige <abbr class="abbrev">IPsec</abbr> host-naar-host configuratie</h4></div></div></div><div class="para">
 				De eerste stap voor het maken van een verbinding is het verzamelen van systeem en netwerk informatie voor ieder werkstation. Voor een host-naar-host verbinding heb je het volgende nodig:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Het IP adres van elke host
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html
index ff0f247..ccc4e04 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. IPsec netwerk-naar-netwerk configuratie" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. IPsec netwerk-naar-netwerk configuratie" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_I
 Psec_Connection.html" title="2.7.8. Het starten en stoppen van een IPsec verbinding" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.7.2. Handmat
 ige IPsec netwerk-naar-netwerk configuratie" id="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.7.7.2. Handmatige <abbr class="abbrev">IPsec</abbr> netwerk-naar-netwerk configuratie</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. IPsec netwerk-naar-netwerk configuratie" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. IPsec netwerk-naar-netwerk configuratie" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_a
 n_IPsec_Connection.html" title="2.7.8. Het starten en stoppen van een IPsec verbinding" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.7.2. Hand
 matige IPsec netwerk-naar-netwerk configuratie" id="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.7.7.2. Handmatige <abbr class="abbrev">IPsec</abbr> netwerk-naar-netwerk configuratie</h4></div></div></div><div class="para">
 				Veronderstel dat <acronym class="acronym">LAN</acronym> A (lana.example.com) en <acronym class="acronym">LAN</acronym> B (lanb.example.com) met elkaar verbinden willen via een <abbr class="abbrev">IPsec</abbr> tunnel. Het netwerk adres voor <acronym class="acronym">LAN</acronym> A is in de 192.168.1.0/24 reeks, terwijl <acronym class="acronym">LAN</acronym> B de 192.168.2.0/24 reeks gebruikt. Het gateway IP adres is 192.168.1.254 voor <acronym class="acronym">LAN</acronym> A en 192.168.2.254 voor <acronym class="acronym">LAN</acronym> B. De <abbr class="abbrev">IPsec</abbr> routers zijn apart van iedere <acronym class="acronym">LAN</acronym> gateway en gebruiken twee netwerkapparaten: eth0 is toegekend an een extern toegankelijk statisch IP adres die toegang geeft tot het Internet, terwijl eth1 werkt als een routing punt voor het bewerken en verzenden van <acronym class="acronym">LAN</acronym> pakketten van een netwerk node naar netwerk nodes op afstand.
 			</div><div class="para">
 				De <abbr class="abbrev">IPsec</abbr> verbinding tussen elk netwerk gebruikt een pre-gedeelde sleutel met de waarde <code class="computeroutput">r3dh4tl1nux</code>, en de beheerders van A en B komen overeen om <code class="command">racoon</code> te gebruiken voor het automatisch genereren en delen van authenticatie sleutels tussen elke <abbr class="abbrev">IPsec</abbr> router. De beheerder van <acronym class="acronym">LAN</acronym> A besluit de <abbr class="abbrev">IPsec</abbr> verbinding <code class="computeroutput">ipsec0</code> te noemen, terwijl de beheerder van <acronym class="acronym">LAN</acronym> B de <abbr class="abbrev">IPsec</abbr> verbinding <code class="computeroutput">ipsec1</code> noemt.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Additional_Resources.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Additional_Resources.html
index 295286f..0d05dc2 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Additional_Resources.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Additional_Resources.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.10. Extra hulpbronnen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Cross gebieds authenticatie instellen" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Nuttige Kerberos websites" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../.
 ./../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.10. Extra hulpbronnen" id="sect-Security_Guide-Kerberos-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.10. Extra hulpbronnen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.10. Extra hulpbronnen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Cross gebieds authenticatie instellen" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Nuttige Kerberos websites" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../.
 ./../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.10. Extra hulpbronnen" id="sect-Security_Guide-Kerberos-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.10. Extra hulpbronnen</h3></div></div></div><div class="para">
 			Voor meer informatie over Kerberos, refereer je naar de volgende hulpbronnen.
 		</div><div class="section" title="2.6.10.1. Geïnstalleerde Kerberos documentatie" id="sect-Security_Guide-Additional_Resources-Installed_Kerberos_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.6.10.1. Geïnstalleerde Kerberos documentatie</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						The <em class="citetitle">Kerberos V5 Installation Guide</em> and the <em class="citetitle">Kerberos V5 System Administrator's Guide</em> in PostScript and HTML formats. These can be found in the <code class="filename">/usr/share/doc/krb5-server-<em class="replaceable"><code>&lt;version-number&gt;</code></em>/</code> directory (where <em class="replaceable"><code>&lt;version-number&gt;</code></em> is the version number of the <code class="command">krb5-server</code> package installed on your system).
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html
index 147d53d..13c334b 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.6. Het instellen van een Kerberos 5 cliënt</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Het instellen van een Kerberos 5 server" /><link rel="next" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Domein naar gebied afbeelding" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src=".
 ./../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.6. Het instellen van een Kerberos 5 cliënt" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.6. Het instellen van een Kerberos 5 cliënt</h3></div></div></div>
 <div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.6. Het instellen van een Kerberos 5 cliënt</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Het instellen van een Kerberos 5 server" /><link rel="next" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Domein naar gebied afbeelding" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src
 ="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.6. Het instellen van een Kerberos 5 cliënt" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.6. Het instellen van een Kerberos 5 cliënt</h3></div></div></d
 iv><div class="para">
 			Het instellen van een Kerberos 5 cliënt is eenvoudiger dan het instellen van de server. Als een minimum installeer je de cliënt pakketten en geef je iedere cliënt een geldig <code class="filename">krb5.conf</code> configuratie bestand. Terwijl <code class="command">ssh</code> en <code class="command">slogin</code> de voorkeur methodes zijn om in te loggen op cliënt systemen, zijn kerberized versies van <code class="command">rsh</code> en <code class="command">rlogin</code> nog steeds beschikbaar, hoewel het gebruik hiervan vereist dat nog een aantal extra configuratie veranderingen gemaakt worden.
 		</div><div class="procedure"><ol class="1"><li class="step" title="Stap 1"><div class="para">
 					Be sure that time synchronization is in place between the Kerberos client and the KDC. Refer to <a class="xref" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Het instellen van een Kerberos 5 server">Paragraaf 2.6.5, “Het instellen van een Kerberos 5 server”</a> for more information. In addition, verify that DNS is working properly on the Kerberos client before configuring the Kerberos client programs.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html
index f27fe57..3d6a6c8 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.5. Het instellen van een Kerberos 5 server</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos en PAM" /><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Het instellen van een Kerberos 5 cliënt" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">
 This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.5. Het instellen van een Kerberos 5 server" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.5. Het instellen van een Kerberos 5 server</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.5. Het instellen van een Kerberos 5 server</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos en PAM" /><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Het instellen van een Kerberos 5 cliënt" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.htm
 l">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.5. Het instellen van een Kerberos 5 server" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.5. Het instellen van een Kerberos 5 server</h3></div></div></div><div class="para">
 			Als Kerberos ingesteld wordt, installeer dan de KDC eerst. Als het nodig is om slaaf servers in te stellen, installeer dan de meester eerst.
 		</div><div class="para">
 			Om de eerste Kerberos KDC in te stellen, volg je deze stappen op:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html
index 93b562c..9434015 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.7. Domein naar gebied afbeelding</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Het instellen van een Kerberos 5 cliënt" /><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Instellen van secundaire KDC's" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../..
 /../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.7. Domein naar gebied afbeelding" id="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.7. Domein naar gebied afbeelding</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.7. Domein naar gebied afbeelding</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Het instellen van een Kerberos 5 cliënt" /><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Instellen van secundaire KDC's" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../..
 /../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.7. Domein naar gebied afbeelding" id="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.7. Domein naar gebied afbeelding</h3></div></div></div><div class="para">
 			Als een cliënt probeert om toegang te krijgen tot een service die op een bepaalde server draait, weet het de naam van de service (<span class="emphasis"><em>host</em></span>) en de naam van de server (<span class="emphasis"><em>foo.example.com</em></span>), maar omdat er meer dan een gebieden in je netwerk kunnen zijn, moet het raden naar de naam van het gebied waarin de server zich bevindt.
 		</div><div class="para">
 			Standaard wordt aangenomen dat de naam van het gebied de DNS naam van de server is in hoofdletters.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-How_Kerberos_Works.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-How_Kerberos_Works.html
index 028d98d..a420317 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-How_Kerberos_Works.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-How_Kerberos_Works.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.3. Hoe werkt Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Kerberos terminologie" /><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos en PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser 
 or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.3. Hoe werkt Kerberos" id="sect-Security_Guide-Kerberos-How_Kerberos_Works"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.3. Hoe werkt Kerberos</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.3. Hoe werkt Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Kerberos terminologie" /><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos en PAM" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your brows
 er or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.3. Hoe werkt Kerberos" id="sect-Security_Guide-Kerberos-How_Kerberos_Works"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.3. Hoe werkt Kerberos</h3></div></div></div><div class="para">
 			Kerberos verschilt van de gebruikersnaam/wachtwoord authenticatie methodes. In plaats van het authenticeren van elke gebruiker voor elke netwerk service, gebruikt Kerberos symmetrische versleuteling en een vertrouwde derde partij (een KDC), om gebruikers te authenticeren voor een aantal netwerk services. Als een gebruiker authenticeert naar de KDC, stuurt de KDC een kaartje specifiek voor die sessie terug naar de machine van de gebruiker, en elke service bewust van Kerberos kijkt naar het kaartje op de machine van de gebruiker in plaats van het vragen aan de gebruiker om authentiek verklaard te worden met gebruik van een wachtwoord.
 		</div><div class="para">
 			Als een gebruiker op een netwerk dat zich bewust is van Kerberos inlogt op zijn werkstation, wordt zijn hoofdrolspeler opgestuurd naar de KDC als onderdeel van een verzoek voor een TGT van de Authenticatie server. Dit verzoek kan verstuurd worden het login programma zodat het transparant is voor de gebruiker, of het kan verzonden worden door het <code class="command">kinit</code> programma nadat de gebruiker heeft ingelogd.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_Terminology.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_Terminology.html
index f153d1e..0703015 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_Terminology.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_Terminology.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.2. Kerberos terminologie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="next" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Hoe werkt Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</i
 frame></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.2. Kerberos terminologie" id="sect-Security_Guide-Kerberos-Kerberos_Terminology"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.2. Kerberos terminologie</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.2. Kerberos terminologie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="next" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Hoe werkt Kerberos" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.
 </iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.2. Kerberos terminologie" id="sect-Security_Guide-Kerberos-Kerberos_Terminology"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.2. Kerberos terminologie</h3></div></div></div><div class="para">
 			Kerberos heeft zijn eigen terminologie om verschillende aspecten van de service te definiëren. Voordat je leert hoe Kerberos werkt, is het belangrijk om de volgende vaktermen te leren.
 		</div><div class="variablelist"><dl><dt><span class="term">authenticatie server (AS)</span></dt><dd><div class="para">
 						Een server die kaartjes uitgeeft voor een gewenste service die op hun beurt gegeven worden aan gebruikers voor toegang tot de service. De AS beantwoordt verzoeken van cliënten die geen legitimatie hebben of niet hebben verstuurd met een verzoek. Het wordt gewoonlijk gebruikt om toegang te krijgen tot de kaartjes uitgevende server (TGS) service door het uitgeven van een kaartjes-gerechtigde kaartje (TGT). De AS draait gewoonlijk op dezelfde host als het sleutel verdelings centrum (KDC).
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_and_PAM.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_and_PAM.html
index ff22955..99a1da8 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_and_PAM.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Kerberos_and_PAM.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.4. Kerberos en PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Hoe werkt Kerberos" /><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Het instellen van een Kerberos 5 server" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, t
 o view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.4. Kerberos en PAM" id="sect-Security_Guide-Kerberos-Kerberos_and_PAM"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.4. Kerberos en PAM</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.4. Kerberos en PAM</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Hoe werkt Kerberos" /><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Het instellen van een Kerberos 5 server" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe
 , to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.4. Kerberos en PAM" id="sect-Security_Guide-Kerberos-Kerberos_and_PAM"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.4. Kerberos en PAM</h3></div></div></div><div class="para">
 			Services die zich bewust zijn van Kerberos maken op dit moment geen gebruik van Pluggable Authentication Modules (PAM) — deze services mijden PAM helemaal. Toepassingen die echter PAM gebruiken kunnen gebruik maken van Kerberos voor authenticatie als de <code class="filename">pam_krb5</code> module (geleverd in het <code class="filename">pam_krb5</code> pakket) geïnstalleerd is. Het <code class="filename">pam_krb5</code> pakket bevat voorbeeld configuratie bestanden die services zoals <code class="command">login</code> en <code class="command">gdm</code> toestaan om gebruikers te authenticeren en ook om initiële legitimatie te verkrijgen met gebruik van hun wachtwoord. Als toegang tot netwerk services altijd wordt uitgevoerd met service die zich bewust zijn van Kerberos of services die GSS-API gebruiken zoals IMAP, kan het netwerk als redelijk veilig beschouwd worden.
 		</div><div class="important"><h2>Belangrijk</h2><div class="para">
 				Beheerders moet er op letten om gebruikers niet toe te staan om authenticatie uit te voeren voor de meeste netwerk services met gebruik van Kerberos wachtwoorden. Vele protocollen versleutelen hun wachtwoorden niet voordat ze over het netwerk verzonden worden, wat de voordelen van het Kerberos systeem vernietigd. Bijvoorbeeld, gebruikers moeten niet toegestaan worden om authenticatie uit te voeren voor Telnet met hetzelfde wachtwoord dat ze voor Kerberos gebruiken.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html
index 83f6fc2..f97c2b4 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.9. Cross gebieds authenticatie instellen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Instellen van secundaire KDC's" /><link rel="next" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an 
 iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.9. Cross gebieds authenticatie instellen" id="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.9. Cross gebieds authenticatie instellen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.9. Cross gebieds authenticatie instellen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Instellen van secundaire KDC's" /><link rel="next" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is 
 an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.9. Cross gebieds authenticatie instellen" id="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.9. Cross gebieds authenticatie instellen</h3></div></div></div><div class="para">
 			<span class="emphasis"><em>Cross-gebieds authenticatie</em></span> is de term die gebruikt wordt voor het beschrijven van situaties waarin cliënten (gewoonlijk gebruikers) van een gebied Kerberos gebruiken voor authenticatie van services (gewoonlijk server processen die draaien op een bepaald server systeem) die behoort tot een ander gebied dan hun eigen.
 		</div><div class="para">
 			In het eenvoudigste geval, om voor een cliënt in een gebied met de naam <code class="literal">A.EXAMPLE.COM</code> toegang te krijgen tot een service in het <code class="literal">B.EXAMPLE.COM</code> gebied, moeten beide gebieden een sleutel delen voor een hoofdrolspeler van de naam <code class="literal">krbtgt/B.EXAMPLE.COM at A.EXAMPLE.COM</code>, en beide sleutels moeten hetzelfde sleutel versie nummer ermee verbonden hebben.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html
index f076605..1176d30 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.8. Instellen van secundaire KDC's</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Domein naar gebied afbeelding" /><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Cross gebieds authenticatie instellen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../.
 ./../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.8. Instellen van secundaire KDC's" id="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.8. Instellen van secundaire KDC's</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6.8. Instellen van secundaire KDC's</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos" /><link rel="prev" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Domein naar gebied afbeelding" /><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Cross gebieds authenticatie instellen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../.
 ./../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.8. Instellen van secundaire KDC's" id="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.8. Instellen van secundaire KDC's</h3></div></div></div><div class="para">
 			Om een aantal redenen kun je er voor kiezen om meerdere KDC's te draaien in een bepaald gebied. In dit scenario bewaart een KDC (de <span class="emphasis"><em>meester KDC</em></span>) een schrijfbare kopie van de gebieds database en draait <code class="command">kadmind</code> (het is ook de <span class="emphasis"><em>admin server</em></span> voor jouw gebied), en een of meer KDC's (slaaf KDC's) bewaren alleen-lezen kopieën van de database en draaien <code class="command">kpropd</code>.
 		</div><div class="para">
 			De meester-slaaf overdrachtsprocedure houdt in dat de meester KDC zijn database dumpt in een tijdelijk dump bestand en dat bestand dan overbrengt naar iedere slaaf., welke daarna zijn vorig ontvangen alleen-lezen kopieën van de database overschrijft met de inhoud van het dump bestand.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos.html
index 5804bfc..7696f82 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Kerberos.html
@@ -1,13 +1,13 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6. Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Gerelateerde boeken" /><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Kerberos terminologie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an ifr
 ame, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.6. Kerberos" id="sect-Security_Guide-Kerberos" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.6. Kerberos</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6. Kerberos</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Gerelateerde boeken" /><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Kerberos terminologie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an 
 iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.6. Kerberos" id="sect-Security_Guide-Kerberos" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.6. Kerberos</h2></div></div></div><div class="para">
 		Systeem beveiliging en integriteit binnen een netwerk kan onhandelbaar zijn. Het kan verschillende beheerders bezighouden om alleen maar in de gaten te houden welke services op een netwerk draaien en hoe deze services gebruikt worden.
 	</div><div class="para">
 		Verder kan de authenticatie van gebruikers voor netwerk services gevaarlijk blijken als de methode gebruikt in het protocol inherent onveilig is, zoals aangetoond wordt door het versturen van onversleutelde wachtwoorden over een netwerk met FTP en Telnet protocollen.
 	</div><div class="para">
 		Kerberos is een manier om de noodzaak voor protocollen die onveilige authenticatie methodes toestaan te elimineren, en op die manier de netwerk beveiliging verbeteren.
 	</div><div class="section" title="2.6.1. Wat is Kerberos?" id="sect-Security_Guide-Kerberos-What_is_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.6.1. Wat is Kerberos?</h3></div></div></div><div class="para">
-			Kerberos is een netwerk authenticatie protocol gemaakt door MIT, wat symmetrische sleutel cryptografie<sup>[<a id="id1655224" href="#ftn.id1655224" class="footnote">14</a>]</sup> gebruikt om gebruikers te authenticeren voor netwerk services, wat betekent dat wachtwoorden nooit echt over het netwerk verstuurd worden.
+			Kerberos is een netwerk authenticatie protocol gemaakt door MIT, wat symmetrische sleutel cryptografie<sup>[<a id="id2298420" href="#ftn.id2298420" class="footnote">14</a>]</sup> gebruikt om gebruikers te authenticeren voor netwerk services, wat betekent dat wachtwoorden nooit echt over het netwerk verstuurd worden.
 		</div><div class="para">
 			Als gevolg hiervan zullen gebruikers die authenticeren voor netwerk services met gebruik van Kerberos, ongeoorloofde gebruikers die proberen wachtwoorden te verzamelen door het bekijken van het netwerk verkeer effectief dwarsbomen.
 		</div><div class="section" title="2.6.1.1. Voordelen van Kerberos" id="sect-Security_Guide-What_is_Kerberos-Advantages_of_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.6.1.1. Voordelen van Kerberos</h4></div></div></div><div class="para">
@@ -30,6 +30,6 @@
 						Om een toepassing Kerberos te laten gebruiken, moet zijn broncode veranderd worden om de juiste aanroepen naar de Kerberos bibliotheken te maken. Toepassingen die op deze manier veranderd zijn worden <em class="firstterm">bewust van Kerberos</em>, of <em class="firstterm">kerberized</em> genoemd. Voor sommige toepassingen kan dit een heel probleem zijn door de grootte van de toepassing of zijn ontwerp. Voor andere niet-compatibele toepassingen moeten veranderingen gemaakt worden in de manier waarop de server en cliënt communiceren. Dit kan nogal wat werk zijn. Gesloten bron toepassingen die standaard geen Kerberos ondersteuning hebben zijn vaak de meest problematische.
 					</div></li><li class="listitem"><div class="para">
 						Kerberos is een alles of niets oplossing. Als Kerberos op het netwerk gebruikt wordt, is elk onversleuteld wachtwoord verstuurd naar een service die zich niet bewust is van Kerberos een gevaar. Dus het netwerk heeft geen voordeel van het gebruik van Kerberos. Om een netwerk met Kerberos te beveiligen, moet men of zich van Kerberos bewuste versies van <span class="emphasis"><em>alle</em></span> cliënt/server toepassingen die wachtwoorden onversleuteld versturen gebruiken, of <span class="emphasis"><em>geen enkele</em></span> van zulke cliënt/server toepassingen gebruiken.
-					</div></li></ul></div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id1655224" href="#id1655224" class="para">14</a>] </sup>
+					</div></li></ul></div></div></div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id2298420" href="#id2298420" class="para">14</a>] </sup>
 				Een systeem waarbij zowel de cliënt als de server een gemeenschappelijke sleutel delen die gebruikt wordt voor het versleutelen en ontsleutelen van netwerk communicatie.
 			</p></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Terug</strong>2.5.5.3. Gerelateerde boeken</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Volgende</strong>2.6.2. Kerberos terminologie</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html
index 8e21c17..4e35401 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.5. Interessante verwijzingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Wat heb je zojuist bereikt" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven" /></head><body class="toc_embeded "><div id="tocdiv" class="
 toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.5. Interessante verwijzingen" id="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="ti
 tle">3.7.5. Interessante verwijzingen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.5. Interessante verwijzingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Wat heb je zojuist bereikt" /><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven" /></head><body class="toc_embeded "><div id="tocdiv" clas
 s="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.5. Interessante verwijzingen" id="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class=
 "title">3.7.5. Interessante verwijzingen</h3></div></div></div><div class="para">
 			Voor extra informatie over LUKS of het versleutelen van harde schijven met Fedora bezoek je een van de volgende verwijzingen:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<a href="http://clemens.endorphin.org/LUKS/">LUKS - Linux Unified Key Setup</a>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html
index 618a0cf..fa068f3 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.3. Stap-voor-stap instructies</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Handmatig mappen versleutelen" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Wat heb je zojuist bereikt" /></head><body class="toc_embeded "><di
 v id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.3. Stap-voor-stap instructies" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions"><div
  class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.3. Stap-voor-stap instructies</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.3. Stap-voor-stap instructies</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Handmatig mappen versleutelen" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Wat heb je zojuist bereikt" /></head><body class="toc_embeded ">
 <div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.3. Stap-voor-stap instructies" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions"><
 div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.3. Stap-voor-stap instructies</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					ga naar runlevel 1: <code class="code">telinit 1</code>
 				</div></li><li class="listitem"><div class="para">
 					koppel je bestaande /home af: <code class="code"> umount /home</code>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html
index d616b2a..54c6c8d 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.4. Wat heb je zojuist bereikt</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Stap-voor-stap instructies" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Interessante verwijzingen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc
 "><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.4. Wat heb je zojuist bereikt" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished"><div class="titlepage"><div><div keep-toge
 ther.within-column="always"><h3 class="title">3.7.4. Wat heb je zojuist bereikt</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.4. Wat heb je zojuist bereikt</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Stap-voor-stap instructies" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Interessante verwijzingen" /></head><body class="toc_embeded "><div id="tocdiv" class="
 toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.4. Wat heb je zojuist bereikt" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished"><div class="titlepage"><div><div keep-t
 ogether.within-column="always"><h3 class="title">3.7.4. Wat heb je zojuist bereikt</h3></div></div></div><div class="para">
 			Gefeliciteerd, je hebt nu een versleutelde partitie waar al je data veilig kan rusten als de computer uit is.
 		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Terug</strong>3.7.3. Stap-voor-stap instructies</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Volgende</strong>3.7.5. Interessante verwijzingen</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html
index f712b6d..bf45107 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.2. Handmatig mappen versleutelen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Stap-voor-stap instructies" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="toc
 frame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.2. Handmatig mappen versleutelen" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.2. Handmatig m
 appen versleutelen</h3></div></div></div><div class="warning"><h2>Waarschuwing</h2><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7.2. Handmatig mappen versleutelen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Stap-voor-stap instructies" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="
 tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.2. Handmatig mappen versleutelen" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.2. Handmati
 g mappen versleutelen</h3></div></div></div><div class="warning"><h2>Waarschuwing</h2><div class="para">
 				Het opvolgen van deze procedure zal alle data verwijderen op de partitie die je gaat versleutelen. Je ZULT al je informatie verliezen! Wees er zeker van dat je een backup maakt van je data naar een externe opslag voordat je met deze procedure begint!
 			</div></div><div class="para">
 			Als je een eerdere versie van Fedora gebruikt dan Fedora 9 en je wilt een partitie versleutelen, of je wilt een partitie versleutelen na de installatie van de huidige versie van Fedora, moet je de volgende instructies gebruiken. Het voorbeeld hieronder laat het versleutelen van je /home partitie zien maar elke partitie kan gebruikt worden.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html
index 47e4e17..1e7c856 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7. LUKS schijf versleuteling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Beveiligde shell" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Handmatig mappen versleutelen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc
 .html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.7. LUKS schijf versleuteling" id="sect-Security_Guide-LUKS_Disk_Encryption" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.7. LUKS schijf versleuteling</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>3.7. LUKS schijf versleuteling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling" /><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Beveiligde shell" /><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Handmatig mappen versleutelen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../
 toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.7. LUKS schijf versleuteling" id="sect-Security_Guide-LUKS_Disk_Encryption" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.7. LUKS schijf versleuteling</h2></div></div></div><div class="para">
 		Linux Unified Key Setup-on-disk-format (of LUKS) staat je toe om partities op je Linux computer te versleutelen. Dit is in het bijzonder belangrijk voor draagbare computers en verwijderbare media. LUKS staat meerdere gebruikerssleutels toe om een meestersleutel te ontsleutelen die daarna gebruikt wordt voor de bulk ontsleuteling van de partitie.
 	</div><div class="section" title="3.7.1. De LUKS implementatie in Fedora" id="sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.1. De LUKS implementatie in Fedora</h3></div></div></div><div class="para">
 			Fedora 9, and later, utilizes LUKS to perform file system encryption. By default, the option to encrypt the file system is unchecked during the installation. If you select the option to encrypt you hard drive, you will be prompted for a passphrase that will be asked every time you boot the computer. This passphrase "unlocks" the bulk encryption key that is used to decrypt your partition. If you choose to modify the default partition table you can choose which partitions you want to encrypt. This is set in the partition table settings
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Access_Control.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Access_Control.html
index b3ca4ff..e8cb32b 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Access_Control.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Access_Control.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.2. Toegangs controle</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden" /><link rel="next" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Shell commando's" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../
 ../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.2. Toegangs controle" id="sect-Security_Guide-Option_Fields-Access_Control"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.2. Toegangs controle</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.2. Toegangs controle</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden" /><link rel="next" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Shell commando's" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../
 ../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.2. Toegangs controle" id="sect-Security_Guide-Option_Fields-Access_Control"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.2. Toegangs controle</h5></div></div></div><div class="para">
 					Optie velden staan beheerders ook toe om hosts expliciet toe te staan of te verbieden in een enkele regel door het toevoegen van de <code class="option">allow</code> of <code class="option">deny</code> instructie als de laatste optie.
 				</div><div class="para">
 					Bijvoorbeeld, de volgende twee regels laten SSH verbindingen toe van <code class="systemitem">cliënt-1.example.com</code>, maar verbieden verbindingen van <code class="systemitem">cliënt-2.example.com</code>:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Expansions.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Expansions.html
index 567267e..5064889 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Expansions.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Expansions.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.4. Uitbreidingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Shell commando's" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an i
 frame, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.4. Uitbreidingen" id="sect-Security_Guide-Option_Fields-Expansions"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.4. Uitbreidingen</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.4. Uitbreidingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Shell commando's" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is a
 n iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.4. Uitbreidingen" id="sect-Security_Guide-Option_Fields-Expansions"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.4. Uitbreidingen</h5></div></div></div><div class="para">
 					Uitbreidingen die tezamen met de <code class="command">spawn</code> en <code class="command">twist</code> instructies gebruikt worden, bieden informatie over de cliënt, server en de betrokken processen.
 				</div><div class="para">
 					De volgende lijst laat de ondersteunde uitbreidingen zien:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Shell_Commands.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Shell_Commands.html
index 87030f0..55a716d 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Shell_Commands.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Option_Fields-Shell_Commands.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.3. Shell commando's</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Toegangs controle" /><link rel="next" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Uitbreidingen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">Thi
 s is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.3. Shell commando's" id="sect-Security_Guide-Option_Fields-Shell_Commands"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.3. Shell commando's</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2.3. Shell commando's</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Toegangs controle" /><link rel="next" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Uitbreidingen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">
 This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.3. Shell commando's" id="sect-Security_Guide-Option_Fields-Shell_Commands"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.3. Shell commando's</h5></div></div></div><div class="para">
 					Optie velden staan toegangs regels toe om shell commando's op te starten met behulp van de volgende twee instructies:
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="command">spawn</code> — Start een shell commando op als een child proces. Deze instructie kan taken uitvoeren zoals het gebruiken van <code class="command">/usr/sbin/safe_finger</code> om meer informatie te krijgen over de cliënt die een verbinding vraagt of het maken van speciale log bestanden met gebruik van het <code class="command">echo</code> commando.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html
index 5e57da5..3b14284 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.2. Controle vlag</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Module naam" /></head><body class="toc_embeded 
 "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.2. Controle vlag" id="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag"><div class="titlepage"><div><div keep-together.within-column="always"><h4 c
 lass="title">2.4.3.2. Controle vlag</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.2. Controle vlag</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Module naam" /></head><body class="toc_embed
 ed "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.2. Controle vlag" id="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag"><div class="titlepage"><div><div keep-together.within-column="always"><h
 4 class="title">2.4.3.2. Controle vlag</h4></div></div></div><div class="para">
 				Alle PAM modules genereren een succes of een faal resultaat als ze aangeroepen worden. Controle vlaggen vertellen PAM wat met dit resultaat te doen. Modules kunnen op een bepaalde manier gestapeld worden, en de controle vlaggen bepalen hoe belangrijk het succes of falen van een bepaalde module is voor het totale doel voor de authenticatie van de gebruiker voor de service.
 			</div><div class="para">
 				Er zijn vier voorgedefinieerde controle vlaggen:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html
index c7e5969..e337376 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.4. Module argementen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Module naam" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Voorbeeld PAM configuratie bestanden" /></head><body class="toc
 _embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.4. Module argementen" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments"><div class="titlepage"><div><div keep-together.within-col
 umn="always"><h4 class="title">2.4.3.4. Module argementen</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.4. Module argementen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Module naam" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Voorbeeld PAM configuratie bestanden" /></head><body class="
 toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.4. Module argementen" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments"><div class="titlepage"><div><div keep-together.within-
 column="always"><h4 class="title">2.4.3.4. Module argementen</h4></div></div></div><div class="para">
 				PAM gebruikt <em class="firstterm">argumenten</em> om voor sommige modules informatie door te geven aan een inplugbare module tijdens de authenticatie
 			</div><div class="para">
 				Bijvoorbeeld, de <code class="filename">pam_userdb.so</code> module gebruikt informatie die bewaard wordt in een Berkeley DB bestand voor authenticatie van de gebruiker. Berkeley DB is is een open bron database systeem ingebouwd in vele toepassingen. De module neemt een <code class="filename">db</code> argument zodat Berkeley DB weet welke database gebruikt moet worden voor de gevraagde service.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html
index 3df5978..56a72ff 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.3. Module naam</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html" title="2.4.3.2. Controle vlag" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Module argementen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><
 iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.3. Module naam" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.3.3. Module naam</h4></div></div></di
 v><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3.3. Module naam</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html" title="2.4.3.2. Controle vlag" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Module argementen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc
 "><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.3. Module naam" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.3.3. Module naam</h4></div></div><
 /div><div class="para">
 				De module naam geeft PAM de naam van de inplugbare module die de opgegeven module interface bevat. In oudere versies van Fedora werd het volledige pad naar de module opgegeven in het PAM configuratie bestand. Echter sinds de komst van <em class="firstterm">multilib</em> systemen, die 64-bit PAM modules in de <code class="filename">/lib64/security/</code> map bewaren, wordt de map naam weggelaten omdat de toepassing gekoppeld is aan de juiste versie van <code class="filename">libpam</code>, welke de locatie van de juiste versie van de module kan bepalen.
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Terug</strong>2.4.3.2. Controle vlag</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Volgende</strong>2.4.3.4. Module argementen</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html
index 671c004..de9c8a2 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.6.2. Algemene pam_timestamp instructies</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legitimatie opslag" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legitimatie opslag" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Dev
 ice_Ownership.html" title="2.4.7. PAM en apparaat eigendom" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.6.2. Algemene pam_timestamp instructi
 es" id="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.6.2. Algemene pam_timestamp instructies</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.6.2. Algemene pam_timestamp instructies</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legitimatie opslag" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legitimatie opslag" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_
 Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.6.2. Algemene pam_timestamp instru
 cties" id="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.6.2. Algemene pam_timestamp instructies</h4></div></div></div><div class="para">
 				De <code class="filename">pam_timestamp.so</code> module accepteert verscheidene instructies. De volgende zijn de twee meest gebruikte opties:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="command">timestamp_timeout</code> — Specificeert de periode (in seconden) waarvoor het tijdsstempel geldig is. De standaard waarde is 300 (vijf minuten).
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html
index 0336208..129d4a2 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.7.2. Toepassing toegang</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen" /></head><body class="toc_embeded "
 ><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.7.2. Toepassing toegang" id="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access"><div class="titlepage"><div><div keep-together.within-colum
 n="always"><h4 class="title">2.4.7.2. Toepassing toegang</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.7.2. Toepassing toegang</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen" /></head><body class="toc_embede
 d "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.7.2. Toepassing toegang" id="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access"><div class="titlepage"><div><div keep-together.within-co
 lumn="always"><h4 class="title">2.4.7.2. Toepassing toegang</h4></div></div></div><div class="para">
 				De console gebruiker heeft ook toegang tot bepaalde programma's ingesteld voor gebruik in de <code class="filename">/etc/security/console.apps/</code> map.
 			</div><div class="para">
 				Deze map bevat configuratie bestanden die de console gebruiker toestaan om bepaalde toepassingen in <code class="filename">/sbin</code> en <code class="filename">/usr/sbin</code> uit te voeren.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html
index 7522af2..763bc39 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.8. Extra hulpbronnen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html" title="2.4.7.2. Toepassing toegang" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Nuttige PAM websites" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe
 " class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.8. Extra hulpbronnen" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.8. Extra hulpbronnen</h3></div></div></di
 v><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.8. Extra hulpbronnen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html" title="2.4.7.2. Toepassing toegang" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Nuttige PAM websites" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfr
 ame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.8. Extra hulpbronnen" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.8. Extra hulpbronnen</h3></div></div><
 /div><div class="para">
 			De volgende hulpbronnen leggen meer methodes uit voor het gebruik en instellen van PAM. Naast deze hulpbronnen, lees je ook de PAM configuratie bestanden op het systeem om beter te begrijpen hoe ze opgebouwd zijn.
 		</div><div class="section" title="2.4.8.1. Geïnstalleerde PAM documentatie" id="sect-Security_Guide-Additional_Resources-Installed_PAM_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.8.1. Geïnstalleerde PAM documentatie</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Aan PAM gerelateerde manual pagina's — Verscheidene manual pagina's bestaan voor verschillende toepassingen en configuratie bestanden betrokken bij PAM. De volgende lijst laat een aantal van de meer belangrijke manual pagina's zien.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html
index 5a9f47a..d27ea62 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.5. PAM modules aanmaken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Voorbeeld PAM configuratie bestanden" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legit
 imatie opslag" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.5. PAM modules aanmaken" id="sect-Security_Guide-Pluggable_Authentication_Mo
 dules_PAM-Creating_PAM_Modules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.5. PAM modules aanmaken</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.5. PAM modules aanmaken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Voorbeeld PAM configuratie bestanden" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve le
 gitimatie opslag" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.5. PAM modules aanmaken" id="sect-Security_Guide-Pluggable_Authentication
 _Modules_PAM-Creating_PAM_Modules"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.5. PAM modules aanmaken</h3></div></div></div><div class="para">
 			Je kunt ten alle tijde nieuwe PAM modules aanmaken of toevoegen voor het gebruik door toepassingen die zich bewust zijn van PAM.
 		</div><div class="para">
 			Bijvoorbeeld, een ontwikkelaar kan een eenmalige-wachtwoord aanmaak methode maken en een PAM module schrijven om het te ondersteunen. Programma's die zich bewust zijn van PAM kunnen deze nieuwe module en wachtwoord methode onmiddellijk gebruiken zonder dat het opnieuw gecompileerd moet worden of anderszins veranderd.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html
index 25cb343..cb58790 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3. PAM configuratie bestand formaat</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html" title="2.4.2. PAM configuratie bestanden" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html" title="2.4.3.2. Controle vlag" /></head><body class="toc_embeded "><div id="tocdiv"
  class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3. PAM configuratie bestand formaat" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format"><div class="titlepage"><div><div keep-together.within-col
 umn="always"><h3 class="title">2.4.3. PAM configuratie bestand formaat</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.3. PAM configuratie bestand formaat</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html" title="2.4.2. PAM configuratie bestanden" /><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html" title="2.4.3.2. Controle vlag" /></head><body class="toc_embeded "><div id="tocd
 iv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3. PAM configuratie bestand formaat" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format"><div class="titlepage"><div><div keep-together.within-
 column="always"><h3 class="title">2.4.3. PAM configuratie bestand formaat</h3></div></div></div><div class="para">
 			Elk PAM configuratie bestand bevat een groep van instructies die als volgt geformatteerd zijn:
 		</div><pre class="screen"><em class="replaceable"><code>&lt;module interface&gt;</code></em>  <em class="replaceable"><code>&lt;control flag&gt;</code></em>   <em class="replaceable"><code>&lt;module name&gt;</code></em>   <em class="replaceable"><code>&lt;module arguments&gt;</code></em>
 </pre><div class="para">
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html
index b6aa3c2..0d60e9f 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.2. PAM configuratie bestanden</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat" /></head><body class="toc_embed
 ed "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.2. PAM configuratie bestanden" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files"><div class="titlepage"><div><div keep-together.w
 ithin-column="always"><h3 class="title">2.4.2. PAM configuratie bestanden</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.2. PAM configuratie bestanden</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat" /></head><body class="toc_em
 beded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.2. PAM configuratie bestanden" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files"><div class="titlepage"><div><div keep-togethe
 r.within-column="always"><h3 class="title">2.4.2. PAM configuratie bestanden</h3></div></div></div><div class="para">
 			De <code class="filename">/etc/pam.d/</code> map bevat de PAM configuratie bestanden voor elke toepassing die zich bewust is van PAM. In eerdere versies van PAM werd het <code class="filename">/etc/pam.conf</code> bestand gebruikt, maar dit bestand is nu verouderd en wordt alleen gebruikt als de <code class="filename">/etc/pam.d/</code> map niet bestaat.
 		</div><div class="section" title="2.4.2.1. PAM service bestanden" id="sect-Security_Guide-PAM_Configuration_Files-PAM_Service_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.2.1. PAM service bestanden</h4></div></div></div><div class="para">
 				Iedere toepassing of <em class="firstterm">service</em> die zich bewust is van PAM heeft een bestand in de <code class="filename">/etc/pam.d/</code> map. Ieder bestand in deze map heeft dezelfde naam als de service waarvoor het de toegang controleert.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html
index c63c49b..0eda410 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.6. PAM en administratieve legitimatie opslag</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html" title="2.4.5. PAM modules aanmaken" /><link rel="next" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html" title="2.4.6.2. Algemene pam_timestamp instructies" 
 /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.6. PAM en administratieve legitimatie opslag" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM
 -PAM_and_Administrative_Credential_Caching"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.6. PAM en administratieve legitimatie opslag</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.6. PAM en administratieve legitimatie opslag</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html" title="2.4.5. PAM modules aanmaken" /><link rel="next" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html" title="2.4.6.2. Algemene pam_timestamp instructie
 s" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.6. PAM en administratieve legitimatie opslag" id="sect-Security_Guide-Pluggable_Authentication_Modules_
 PAM-PAM_and_Administrative_Credential_Caching"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.6. PAM en administratieve legitimatie opslag</h3></div></div></div><div class="para">
 			Een aantal grafische administratieve gereedschappen in Fedora bieden gebruikers voor vijf minuten verhoogde rechten aan met gebruik van de <code class="filename">pam_timestamp.so</code> module. Het is belangrijk om te begrijpen hoe dit mechanisme werkt, omdat een gebruiker die wegloopt van een terminal terwijl <code class="filename">pam_timestamp.so</code> effectief is de machine open laat voor manipulatie voor iedereen met fysieke toegang tot de console.
 		</div><div class="para">
 			In het PAM tijdsstempel schema, vraagt de grafische administratieve toepassing als het het opgestart wordt de gebruiker naar het root wachtwoord. Als de gebruiker gemachtigd is, maakt de <code class="filename">pam_timestamp.so</code> module een tijdsstempel bestand aan. Standaard wordt dit aangemaakt in de <code class="filename">/var/run/sudo/</code> map. Als het tijdsstempel bestand al bestaat, vragen grafische administratieve programma's niet naar een wachtwoord. In plaats daarvan ververst de <code class="filename">pam_timestamp.so</code> module het tijdsstempel bestand, en reserveert een extra vijf minuten van ongehinderde administratieve toegang.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html
index f5bcb4a..9bfc2e3 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.7. PAM en apparaat eigendom</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html" title="2.4.6.2. Algemene pam_timestamp instructies" /><link rel="next" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html" title="2.4.7.2. Toepassing toegang" /></head><body class="toc_embed
 ed "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.7. PAM en apparaat eigendom" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership"><div class="titlepage"><div><div ke
 ep-together.within-column="always"><h3 class="title">2.4.7. PAM en apparaat eigendom</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.7. PAM en apparaat eigendom</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html" title="2.4.6.2. Algemene pam_timestamp instructies" /><link rel="next" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html" title="2.4.7.2. Toepassing toegang" /></head><body class="toc_em
 beded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.7. PAM en apparaat eigendom" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership"><div class="titlepage"><div><div
  keep-together.within-column="always"><h3 class="title">2.4.7. PAM en apparaat eigendom</h3></div></div></div><div class="para">
 			In Fedora kan de eerste gebruiker die inlogt op de fysieke console van de machine bepaalde apparaten manipuleren en bepaalde taken uitvoeren die normaal voorbehouden zijn aan de root gebruiker. Dit wordt gecontroleerd door een PAM module met de naam <code class="filename">pam_console.so</code>.
 		</div><div class="section" title="2.4.7.1. Apparaat eigendom" id="sect-Security_Guide-PAM_and_Device_Ownership-Device_Ownership"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.4.7.1. Apparaat eigendom</h4></div></div></div><div class="para">
 				Als een gebruiker inlogt op een Fedora systeem, wordt de <code class="filename">pam_console.so</code> module aangeroepen door <code class="command">login</code> of de grafische login programma's, <span class="application"><strong>gdm</strong></span>, <span class="application"><strong>kdm</strong></span>, en <span class="application"><strong>xdm</strong></span>. Als deze gebruiker de eerste gebruiker is die inlogt op de fysieke console — waarnaar gerefereerd wordt als de <em class="firstterm">console gebruiker</em> — geeft de module de gebruiker het eigendom van een aantal apparaten die normaal eigendom zijn van root. De console gebruiker heeft deze apparaten in eigendom totdat de laatste sessie van die gebruiker beëindigd wordt. Nadat deze gebruiker uitgelogd is, vervalt het eigendom van de apparaten terug aan de root gebruiker.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html
index f980a3a..e1351b3 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.4. Voorbeeld PAM configuratie bestanden</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Module argementen" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html" title="2.4.5. PAM modules aanmaken" /></head><body class="toc_embeded "><div id="tocd
 iv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.4. Voorbeeld PAM configuratie bestanden" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files"><div class="titlepage"><div><div keep-together.w
 ithin-column="always"><h3 class="title">2.4.4. Voorbeeld PAM configuratie bestanden</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.4. Voorbeeld PAM configuratie bestanden</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Module argementen" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html" title="2.4.5. PAM modules aanmaken" /></head><body class="toc_embeded "><div id="t
 ocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.4. Voorbeeld PAM configuratie bestanden" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files"><div class="titlepage"><div><div keep-togethe
 r.within-column="always"><h3 class="title">2.4.4. Voorbeeld PAM configuratie bestanden</h3></div></div></div><div class="para">
 			Het volgende is een voorbeeld PAM toepassings configuratie bestand:
 		</div><pre class="screen">#%PAM-1.0
 auth		required  pam_securetty.so
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html
index 8a61dbc..0cd63e2 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4. Pluggable Authentication Modules (PAM)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" title="2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html" title="2.4.2. PAM configuratie bestanden" /></head
 ><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.4. Pluggable Authentication Modules (PAM)" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM" la
 ng="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.4. Pluggable Authentication Modules (PAM)</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4. Pluggable Authentication Modules (PAM)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" title="2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html" title="2.4.2. PAM configuratie bestanden" /></h
 ead><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.4. Pluggable Authentication Modules (PAM)" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM"
  lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.4. Pluggable Authentication Modules (PAM)</h2></div></div></div><div class="para">
 		Programma's die gebruikers toegang geven tot een systeem gebruiken <em class="firstterm">authenticatie</em> om elkaars identiteit te controleren (dat betekent, vast te stellen dat een gebruiker is wie hij zegt te zijn).
 	</div><div class="para">
 		Vroeger had ieder programma zijn eigen manier voor de authenticatie van gebruikers. In Fedora zijn veel programma's ingesteld om een centraal authenticatie mechanisme te gebruiken, <em class="firstterm">Pluggable Authentication Modules</em> (<acronym class="acronym">PAM</acronym>) genaamd
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html
index a7c5441..a4f0b14 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>5.2. LUKS partitie versleuteling gebruiken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie" /><link rel="prev" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie" /><link rel="next" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This i
 s an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Secure_Installation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Software_Maintenance.html"><strong>Volgende</strong></a></li></ul><div class="section" title="5.2. LUKS partitie versleuteling gebruiken" id="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">5.2. LUKS partitie versleuteling gebruiken</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>5.2. LUKS partitie versleuteling gebruiken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie" /><link rel="prev" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie" /><link rel="next" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">Thi
 s is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Secure_Installation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Software_Maintenance.html"><strong>Volgende</strong></a></li></ul><div class="section" title="5.2. LUKS partitie versleuteling gebruiken" id="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">5.2. LUKS partitie versleuteling gebruiken</h2></div></div></div><div class="para">
 			Sinds Fedora 9 is de implementatie van <a href="http://fedoraproject.org/wiki/Security_Guide/9/LUKSDiskEncryption">Linux Unified Key Setup-on-disk-format</a>(LUKS) versleuteling veel eenvoudiger geworden. Tijdens het installatie proces wordt een optie om de partities te versleutelen aangeboden aan de gebruiker. De gebruiker moet de benodigde wachtzin opgeven wat de sleutel zal zijn om de bulk sleutel te openen die gebruikt zal worden om de data van de partitie te beveiligen.
 		</div><div class="para">
 			Fedora 8 heeft echter geen ingebouwde LUKS ondersteuning, het kan echter eenvoudig geïmplementeerd worden. <a href="http://fedoraproject.org/wiki/Security_Guide/9/LUKSDiskEncryption#Step-by-Step_Instructions">Stap-voor-stap procedures</a> zijn beschikbaar die gebruikers partitie versleuteling laten implementeren op hun Fedora 8 installatie.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Anonymous_Access.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Anonymous_Access.html
index 518ce6a..aeaa638 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Anonymous_Access.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Anonymous_Access.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.2. Anonieme toegang</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen" /><link rel="next" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Gebruikersaccounts" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to vie
 w it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.2. Anonieme toegang" id="sect-Security_Guide-Securing_FTP-Anonymous_Access"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.2. Anonieme toegang</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.2. Anonieme toegang</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen" /><link rel="next" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Gebruikersaccounts" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to 
 view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.2. Anonieme toegang" id="sect-Security_Guide-Securing_FTP-Anonymous_Access"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.2. Anonieme toegang</h4></div></div></div><div class="para">
 				De aanwezigheid van de <code class="filename">/var/ftp/</code> map activeert het anonymous account.
 			</div><div class="para">
 				De eenvoudigste manier om deze map te maken is het installeren van het <code class="filename">vsftpd</code> pakket. Dit pakket zet een mapstructuur op voor anonieme gebruikers en stelt de rechten voor mappen in op alleen-lezen voor anonieme gebruikers.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html
index c8a65ed..258b8ea 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.4. Gebruik TCP wrappers om toegang te controleren</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Gebruikersaccounts" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../.
 ./../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren" id="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.4. Gebruik TCP wrappers om toegang te controleren</h4></div></div></
 div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.4. Gebruik TCP wrappers om toegang te controleren</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Gebruikersaccounts" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../.
 ./../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren" id="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.4. Gebruik TCP wrappers om toegang te controleren</h4></div></div
 ></div><div class="para">
 				Use TCP Wrappers to control access to either FTP daemon as outlined in <a class="xref" href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Securing_Services_With_TCP_Wrappers_and_xinetd-Enhancing_Security_With_TCP_Wrappers" title="2.2.1.1. Het verbeteren van beveiliging met TCP wrappers">Paragraaf 2.2.1.1, “Het verbeteren van beveiliging met TCP wrappers”</a>.
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Terug</strong>2.2.6.3. Gebruikersaccounts</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Volgende</strong>2.2.7. Sendmail beveiligen</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-User_Accounts.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-User_Accounts.html
index be61ad8..ef936a6 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-User_Accounts.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_FTP-User_Accounts.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.3. Gebruikersaccounts</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Anonieme toegang" /><link rel="next" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="t
 oc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.3. Gebruikersaccounts" id="sect-Security_Guide-Securing_FTP-User_Accounts"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.3. Gebruikersaccounts</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6.3. Gebruikersaccounts</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Anonieme toegang" /><link rel="next" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class
 ="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.3. Gebruikersaccounts" id="sect-Security_Guide-Securing_FTP-User_Accounts"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.6.3. Gebruikersaccounts</h4></div></div></div><div class="para">
 				Omdat FTP voor authenticatie onversleutelde gebruikersnamen en wachtwoorden verstuurd over onveilige netwerken, is het een goed idee om systeem gebruikers toegang tot de server vanaf hun gebruikersaccount te verbieden.
 			</div><div class="para">
 				Om alle gebruikersaccount in <code class="command">vsftpd</code> uit te zetten, voeg je de volgende instructie toe aan <code class="filename">/etc/vsftpd/vsftpd.conf</code>:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html
index 504bd85..c47fb3b 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.2. Let op syntax fouten</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen" /><link rel="next" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. Gebruik de no_root_squash optie niet" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="..
 /../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.2. Let op syntax fouten" id="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.2. Let op syntax fouten</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.2. Let op syntax fouten</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen" /><link rel="next" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. Gebruik de no_root_squash optie niet" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src=
 "../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.2. Let op syntax fouten" id="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.2. Let op syntax fouten</h4></div></div></div><div class="para">
 				De NFS server bepaalt welke bestandssystemen geëxporteerd worden en welke hosts deze mappen moeten exporteren door het raadplegen van het <code class="filename">/etc/exports</code> bestand. Let er op om geen onnodige spaties toe te voegen bij het bewerken van dit bestand.
 			</div><div class="para">
 				Bijvoorbeeld, de volgende regel in het <code class="filename">/etc/exports</code> bestand deelt de map <code class="command">/tmp/nfs/</code> met de host <code class="command">bob.example.com</code> met lees/schrijf rechten.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html
index de134f1..b3ce6d1 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.3. Gebruik de no_root_squash optie niet</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Let op syntax fouten" /><link rel="next" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. NFS firewall instelling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc
 " src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.3. Gebruik de no_root_squash optie niet" id="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.3. Gebruik de <code class="command">no_root_sq
 uash</code> optie niet</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.3. Gebruik de no_root_squash optie niet</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Let op syntax fouten" /><link rel="next" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. NFS firewall instelling" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="
 toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.3. Gebruik de no_root_squash optie niet" id="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.3. Gebruik de <code class="command">no_root
 _squash</code> optie niet</h4></div></div></div><div class="para">
 				Standaard veranderen NFS delingen de root gebruiker naar de <code class="command">nfsnobody</code> gebruiker, een gebruikersaccount zonder rechten. Dit verandert de eigenaar van alle door root aangemaakte bestanden naar <code class="command">nfsnobody</code>, wat verhindert dat programma's binnen gehaald worden waarbij de setuid bit gezet is.
 			</div><div class="para">
 				Als <code class="command">no_root_squash</code> wordt gebruikt, zijn root gebruikers op afstand in staat om elk bestand in het gedeelde bestandssysteem te veranderen en toepassingen besmet met een trojaan achter te laten die andere gebruikers onopzettelijk uitvoeren.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html
index 8e588fa..0d802f1 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.4. NFS firewall instelling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. Gebruik de no_root_squash optie niet" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. De Apache HTTP server beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><
 iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.4. NFS firewall instelling" id="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.4. NFS firewall i
 nstelling</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4.4. NFS firewall instelling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. Gebruik de no_root_squash optie niet" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. De Apache HTTP server beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc
 "><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.4. NFS firewall instelling" id="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.4. NFS firewal
 l instelling</h4></div></div></div><div class="para">
 				De voor NFS gebruikte poorten worden dynamisch toegekend door rpcbind, wat problemen kan veroorzaken bij het maken van firewall regels. Om dit proces te vereenvoudigen gebruik je het <span class="emphasis"><em>/etc/sysconfig/nfs</em></span> bestand om op te geven welke poorten gebruikt moeten worden:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="command">MOUNTD_PORT</code> — TCP en UDP poort voor mountd (rpc.mountd)
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html
index 6a386c1..d3fbe27 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.4. Ken statische poorten toe en gebruik iptables regels</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Bewerk het /var/yp/securenets bestand" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Gebruik Kerberos authenticatie" /></head><body class="toc_embeded "><div i
 d="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.4. Ken statische poorten toe en gebruik iptables regels" id="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules"><div class="titlepage"><div><div keep-together.within-co
 lumn="always"><h4 class="title">2.2.3.4. Ken statische poorten toe en gebruik iptables regels</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.4. Ken statische poorten toe en gebruik iptables regels</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Bewerk het /var/yp/securenets bestand" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Gebruik Kerberos authenticatie" /></head><body class="toc_embeded "><di
 v id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.4. Ken statische poorten toe en gebruik iptables regels" id="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules"><div class="titlepage"><div><div keep-together.within
 -column="always"><h4 class="title">2.2.3.4. Ken statische poorten toe en gebruik iptables regels</h4></div></div></div><div class="para">
 				Alle servers gerelateerd aan NIS kunnen specifieke poorten toegewezen krijgen behalve voor <code class="command">rpc.yppasswdd</code> — de daemon die gebruikers toestaat hun login wachtwoord te veranderen. Poorten toekennen aan de andere twee NIS server daemons, <code class="command">rpc.ypxfrd</code> en <code class="command">ypserv</code>, staat toe om firewall regels te maken om de NIS server daemons verder te beschermen tegen indringers.
 			</div><div class="para">
 				Om dit te doen, voeg je de volgende rgels toe aan <code class="filename">/etc/sysconfig/network</code>:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html
index 5ccc838..c1eb19e 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.3. Bewerk het /var/yp/securenets bestand</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Ken statische poorten toe 
 en gebruik iptables regels" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.3. Bewerk het /var/yp/securenets bestand" id="sect-Security_Guide-Securing_NIS-Edit_the_va
 rypsecurenets_File"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.3.3. Bewerk het <code class="filename">/var/yp/securenets</code> bestand</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.3. Bewerk het /var/yp/securenets bestand</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Ken statische poorten t
 oe en gebruik iptables regels" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.3. Bewerk het /var/yp/securenets bestand" id="sect-Security_Guide-Securing_NIS-Edit_the
 _varypsecurenets_File"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.3.3. Bewerk het <code class="filename">/var/yp/securenets</code> bestand</h4></div></div></div><div class="para">
 				Als het <code class="filename">/var/yp/securenets</code> bestand leeg is of niet bestaat (zoals het geval is na een standaard installatie), luistert NIS naar alle netwerken. Een van de eerste dingen om te doen is om netmasker/netwerk paren in het bestand te plaatsen zodat <code class="command">ypserv</code> alleen verzoeken van het juiste netwerk beantwoordt.
 			</div><div class="para">
 				Hieronder staat een voorbeeld regel in een <code class="filename">/var/yp/securenets</code> bestand:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html
index 9d01ac1..aac3777 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.5. Gebruik Kerberos authenticatie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Ken statische poorten toe en gebruik iptables regels" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><
 iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.5. Gebruik Kerberos authenticatie" id="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.3.5. Gebruik Kerberos au
 thenticatie</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.5. Gebruik Kerberos authenticatie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Ken statische poorten toe en gebruik iptables regels" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc
 "><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.5. Gebruik Kerberos authenticatie" id="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.3.5. Gebruik Kerberos
  authenticatie</h4></div></div></div><div class="para">
 				Een van de problemen te overwegen als NIS gebruikt wordt voor authenticatie is dat telkens als een gebruiker inlogt op een machine, een wachtwoord hash van de <code class="filename">/etc/shadow</code> map verstuurd wordt over het netwerk. Als een indringer toegang krijgt tot een NIS domein en het netwerkverkeer besnuffelt, kan deze gebruikersnamen en wachtwoord hashes verzamelen. Met genoeg tijd, kan een wachtwoord kraakprogramma zwakke wachtwoorden raden, en een aanvaller kan toegang krijgen tot een geldig account op het netwerk.
 			</div><div class="para">
 				Since Kerberos uses secret-key cryptography, no password hashes are ever sent over the network, making the system far more secure. Refer to <a class="xref" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos">Paragraaf 2.6, “Kerberos”</a> for more information about Kerberos.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html
index cbf93cd..bd92773 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Bewerk het /var/yp/securenets bestand" /></head><body class="toc_embeded "><div id="tocdi
 v" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord" id="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname"><div class="titlepage"><div><div keep-together.within-co
 lumn="always"><h4 class="title">2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Bewerk het /var/yp/securenets bestand" /></head><body class="toc_embeded "><div id="to
 cdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord" id="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname"><div class="titlepage"><div><div keep-together.within
 -column="always"><h4 class="title">2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord</h4></div></div></div><div class="para">
 				Elke machine binnen een NIS domein kan commando's gebruiken om informatie te achterhalen van de server zonder authenticatie, mits de gebruiker de DNS hostnaam van de server en de NIS domeinnaam weet.
 			</div><div class="para">
 				Bijvoorbeeld, als iemand of een laptop computer met het netwerk verbindt of van buiten in het netwerk inbreekt (en erin slaagt om een intern IP adres te vervalsen), laat het volgende commando de <code class="command">/etc/passwd</code> map zien:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html
index 961f111..cdb1273 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.2.2. Bescherm portmap met iptables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../to
 c.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.2.2. Bescherm portmap met iptables" id="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.2.2. Bescherm portmap met iptables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.2.2. Bescherm portmap met iptables</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../..
 /toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.2.2. Bescherm portmap met iptables" id="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.2.2. Bescherm portmap met iptables</h4></div></div></div><div class="para">
 				Om verdere toegang tot de <code class="command">portmap</code> service te beperken, is het een goed idee om iptables regels toe te voegen aan de server en de toegang te beperken tot specifieke netwerken.
 			</div><div class="para">
 				Hieronder zijn twee voorbeeld iptables commando's. De eerste staat TCP verbindingen toe naar poort 111 (gebruikt door de <code class="command">portmap</code> service) vanaf het 192.168.0.0/24 netwerk. De tweede staat TCP verbindingen toe naar dezelfde poort vanaf de localhost. Dit is nodig voor de <code class="command">sgi_fam</code> service gebruikt door <span class="application"><strong>Nautilus</strong></span>. Alle andere pakketten worden genegeerd.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html
index 66e14cf..b1b03de 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7.3. Alleen-mail gebruikers</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen" /><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS en Sendmail" /><link rel="next" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Het verifiëren van welke poorten luisteren" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="t
 ocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7.3. Alleen-mail gebruikers" id="sect-Security_Guide-Securing_Sendmail-Mail_only_Users"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.7.3. Alleen-mail gebruikers</h4></div></div></div
 ><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7.3. Alleen-mail gebruikers</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen" /><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS en Sendmail" /><link rel="next" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Het verifiëren van welke poorten luisteren" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id
 ="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7.3. Alleen-mail gebruikers" id="sect-Security_Guide-Securing_Sendmail-Mail_only_Users"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.7.3. Alleen-mail gebruikers</h4></div></div></
 div><div class="para">
 				Om uitbuitingen door lokale gebruikers van de Sendmail server te helpen voorkomen, is het het beste dat mail gebruikers alleen toegang hebben tot de Sendmail server door het gebruik van een email programma. Shell account moeten op de mail server niet toegelaten worden en alle gebruikers in het <code class="filename">/etc/passwd</code> bestand moeten ingesteld worden met <code class="command">/sbin/nologin</code> (met de root gebruiker als mogelijke uitzondering).
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Terug</strong>2.2.7.2. NFS en Sendmail</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Volgende</strong>2.2.8. Het verifiëren van welke poorten luisteren</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html
index d928ee6..b4562ac 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7.2. NFS en Sendmail</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen" /><link rel="next" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Alleen-mail gebruikers" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.h
 tml">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7.2. NFS en Sendmail" id="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.7.2. NFS en Sendmail</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7.2. NFS en Sendmail</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen" /><link rel="next" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Alleen-mail gebruikers" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../to
 c.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7.2. NFS en Sendmail" id="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.7.2. NFS en Sendmail</h4></div></div></div><div class="para">
 				Plaats de mail spool map, <code class="filename">/var/spool/mail/</code>, nooit in een NFS gedeelde volume.
 			</div><div class="para">
 				Omdat NFSv2 and NFSv3 geen controle onderhouden van gebruikers en groeps ID's, kunnen twee of meer gebruikers dezelfde UID hebben en kunnen elkaars mail ontvangen en lezen.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Security_Updates.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Security_Updates.html
index fa893a8..d9e2950 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Security_Updates.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Security_Updates.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5. Beveiligings vernieuwingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /><link rel="prev" href="sect-Security_Guide-Common_Exploits_and_Attacks.html" title="1.4. Veel voorkomende uitbuitingen en aanvallen" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Ondertekende pakketten verifiëren" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe"
  class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.5. Beveiligings vernieuwingen" id="sect-Security_Guide-Security_Updates" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.5. Beveiligings vernieuwingen</h2></div></div></div><div clas
 s="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5. Beveiligings vernieuwingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /><link rel="prev" href="sect-Security_Guide-Common_Exploits_and_Attacks.html" title="1.4. Veel voorkomende uitbuitingen en aanvallen" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Ondertekende pakketten verifiëren" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfra
 me" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.5. Beveiligings vernieuwingen" id="sect-Security_Guide-Security_Updates" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.5. Beveiligings vernieuwingen</h2></div></div></div><div c
 lass="para">
 		Als beveiligings kwetsbaarheden ontdekt worden, moet de betreffende software vernieuwd worden om elk potentieel beveiligings risico te beperken. Als de software onderdeel is van een pakket in de Fedora distributie die op dat moment ondersteund wordt, heeft Fedora zich verplicht om zo spoedig mogelijk vernieuwde pakketten vrij te geven die de kwetsbaarheid repareren. Vaak gaan aankondigingen van een bepaalde beveiligings uitbuiting gepaard met een correctie (of bron code die het probleem repareert). Deze correctie wordt dan toegepast in het Fedora pakket, getest, en vrijgegeven als een errata vernieuwing. Als de aankondiging echter geen correctie bevat, werkt een ontwikkelaar eerst samen met de onderhouder van de software om het probleem op te lossen. Zodra het probleem opgelost is, wordt het pakket getest en vrijgegeven als een errata vernieuwing.
 	</div><div class="para">
 		Als een errata vernieuwing wordt vrijgegeven voor software die op je systeem gebruikt wordt, wordt het ten sterkste aanbevolen dat je de betreffende pakketten zo spoedig mogelijk vernieuwt om de tijdsduur dat je systeem potentieel kwetsbaar is te minimaliseren.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_FTP.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_FTP.html
index 745856d..f1fb090 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_FTP.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_FTP.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6. FTP beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. De Apache HTTP server beveiligen" /><link rel="next" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Anonieme toegang" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">Th
 is is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6. FTP beveiligen" id="sect-Security_Guide-Server_Security-Securing_FTP"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.6. FTP beveiligen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.6. FTP beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. De Apache HTTP server beveiligen" /><link rel="next" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Anonieme toegang" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html"
 >This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6. FTP beveiligen" id="sect-Security_Guide-Server_Security-Securing_FTP"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.6. FTP beveiligen</h3></div></div></div><div class="para">
 			Het <em class="firstterm">File Transfer Protocol</em> (<abbr class="abbrev">FTP</abbr>) is een ouder TCP protocol ontworpen voor het overbrengen van bestanden over een netwerk. Omdat alle transacties met de server, inclusief gebruikers authenticatie, onversleuteld zijn, wordt het beschouwd als een onveilig protocol en moet het zorgvuldig ingesteld worden.
 		</div><div class="para">
 			Fedora levert drie FTP servers.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NFS.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NFS.html
index 172e261..500ef54 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NFS.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NFS.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4. NFS beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Gebruik Kerberos authenticatie" /><link rel="next" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Let op syntax fouten" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html
 ">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4. NFS beveiligen" id="sect-Security_Guide-Server_Security-Securing_NFS"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.4. NFS beveiligen</h3></div></div></div><div class="important"><h2>Belangrijk</h2><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.4. NFS beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Gebruik Kerberos authenticatie" /><link rel="next" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Let op syntax fouten" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.h
 tml">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4. NFS beveiligen" id="sect-Security_Guide-Server_Security-Securing_NFS"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.4. NFS beveiligen</h3></div></div></div><div class="important"><h2>Belangrijk</h2><div class="para">
 				The version of NFS included in Fedora, NFSv4, no longer requires the <code class="command">portmap</code> service as outlined in <a class="xref" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen">Paragraaf 2.2.2, “Portmap beveiligen”</a>. NFS traffic now utilizes TCP in all versions, rather than UDP, and requires it when using NFSv4. NFSv4 now includes Kerberos user and group authentication, as part of the <code class="filename">RPCSEC_GSS</code> kernel module. Information on <code class="command">portmap</code> is still included, since Fedora supports NFSv2 and NFSv3, both of which utilize <code class="command">portmap</code>.
 			</div></div><div class="section" title="2.2.4.1. Plan het netwerk zorgvuldig" id="sect-Security_Guide-Securing_NFS-Carefully_Plan_the_Network"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.2.4.1. Plan het netwerk zorgvuldig</h4></div></div></div><div class="para">
 				Nu NFSv4 de mogelijkheid heeft om alle informatie met gebruik van Kerberos versleuteld over een netwerk te versturen, is het belangrijk dat de service correct ingesteld wordt als het achter een firewall of in een verdeeld netwerk is. NFSv2 en NFSv3 geven data nog steeds onveilig door, en dit moet in gedachte worden gehouden. Zorgvuldig netwerk ontwerp in al deze opzichten kunnen beveiligings inbreuken helpen voorkomen.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NIS.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NIS.html
index 70b562c..9f2805c 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NIS.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_NIS.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3. Het beveiligen van NIS</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Bescherm portmap met iptables" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord" /></head><body class="toc_embeded "><div
  id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3. Het beveiligen van NIS" id="sect-Security_Guide-Server_Security-Securing_NIS"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">
 2.2.3. Het beveiligen van NIS</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.3. Het beveiligen van NIS</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Bescherm portmap met iptables" /><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord" /></head><body class="toc_embeded "><
 div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3. Het beveiligen van NIS" id="sect-Security_Guide-Server_Security-Securing_NIS"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="titl
 e">2.2.3. Het beveiligen van NIS</h3></div></div></div><div class="para">
 			Het <em class="firstterm">Network Information Service</em> (<acronym class="acronym">NIS</acronym>) is een RPC service, <code class="command">ypserv</code> genaamd, welke wordt gebruikt in combinatie met <code class="command">portmap</code> en andere gerelateerde services om overzichten van gebruikersnamen, wachtwoorden en andere gevoelige informatie te verspreiden naar elke computer die beweert zich binnen het domein te bevinden.
 		</div><div class="para">
 			Een NIS server wordt opgebouwd met verscheidene toepassingen. Ze omvatten de volgende:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Portmap.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Portmap.html
index ff4abb0..1d023da 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Portmap.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Portmap.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.2. Portmap beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="next" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Bescherm portmap met iptables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an ifram
 e, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.2. Portmap beveiligen" id="sect-Security_Guide-Server_Security-Securing_Portmap"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.2. Portmap beveiligen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.2. Portmap beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="next" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Bescherm portmap met iptables" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an if
 rame, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.2. Portmap beveiligen" id="sect-Security_Guide-Server_Security-Securing_Portmap"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.2. Portmap beveiligen</h3></div></div></div><div class="para">
 			De <code class="command">portmap</code> service is een dynamische poort toekennings daemon voor RPC services zoals NIS en NFS. Het heeft zwakke authenticatie mechanismes en heeft de mogelijkheid om een brede reeks poorten toe te kennen aan de services die het controleert. Om deze redenen is het moeilijk te beveiligen.
 		</div><div class="note"><h2>Opmerking</h2><div class="para">
 				<code class="command">Portmap</code> beveiligen heeft alleen effect voor NFSv2 en NFSv3 implementaties, omdat NFSv4 het niet langer nodig heeft. Als je van plan bent om een NFSv2 of NFSv3 server te maken, is <code class="command">portmap</code> vereist, en is de volgende paragraaf van toepassing.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Sendmail.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Sendmail.html
index 6796fb9..cde80cc 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Sendmail.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_Sendmail.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7. Sendmail beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren" /><link rel="next" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS en Sendmail" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src=
 "../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7. Sendmail beveiligen" id="sect-Security_Guide-Server_Security-Securing_Sendmail"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.7. Sendmail beveiligen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.7. Sendmail beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren" /><link rel="next" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS en Sendmail" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" s
 rc="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7. Sendmail beveiligen" id="sect-Security_Guide-Server_Security-Securing_Sendmail"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.7. Sendmail beveiligen</h3></div></div></div><div class="para">
 			Sendmail is een Mail Transfer Agent (MTA) die het Simple Mail Transfer Protocol (SMTP) gebruikt om elektronische boodschappen te bezorgen naar andere MTA's en naar email cliënten of afleveringsagenten. Hoewel vele MTA's hun verkeer kunnen versleutelen, doen de meeste dit niet, dus het versturen van email over alle publieke netwerken wordt als een inherent onveilige manier van communicatie beschouwd.
 		</div><div class="para">
 			Het wordt aanbevolen dat iedereen die van plan is een Sendmail server te maken aandacht geeft aan de volgende punten.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html
index 264c4e2..a4b8d0c 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.5. De Apache HTTP server beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. NFS firewall instelling" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This
  is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.5. De Apache HTTP server beveiligen" id="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.5. De Apache HTTP server beveiligen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.5. De Apache HTTP server beveiligen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. NFS firewall instelling" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">T
 his is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.5. De Apache HTTP server beveiligen" id="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.5. De Apache HTTP server beveiligen</h3></div></div></div><div class="para">
 			De Apache HTTP server is een van de meest stabiele en veilige services die meegeleverd worden met Fedora. Een groot aantal opties en technieken zijn beschikbaar om de Apache HTTP server te beveiligen — te veel om ze hier diepgaand te behandelen. De volgende paragraaf legt in het kort goede praktijken uit voor het draaien van de Apache HTTP server.
 		</div><div class="para">
 			Controleer altijd dat alle scripts die op het systeem draaien werken zoals bedoeld is <span class="emphasis"><em>voordat</em></span> je ze in gebruik neemt. Verzeker je er ook van dat alleen de root gebruiker schrijf rechten heeft in alle mappen die scripts of CGI's bevatten. Om dit te doen, voer je de volgende commando's uit als de root gebruiker:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html
index e2783c9..51cfd21 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.8. Het verifiëren van welke poorten luisteren</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Alleen-mail gebruikers" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../..
 /../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.8. Het verifiëren van welke poorten luisteren" id="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.8. Het verifiëren van welke poorten luisteren</h3></div></div></div><div cla
 ss="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2.8. Het verifiëren van welke poorten luisteren</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging" /><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Alleen-mail gebruikers" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="..
 /../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.8. Het verifiëren van welke poorten luisteren" id="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.2.8. Het verifiëren van welke poorten luisteren</h3></div></div></div><div 
 class="para">
 			Na het instellen van de netwerk services, is het belangrijk om aandacht te geven naar welke poorten van de interfaces van het netwerk van het systeem feitelijk geluisterd wordt.
 		</div><div class="para">
 			Er zijn twee basis benaderingen voor het opsommen van de poorten die luisteren op het netwerk. De minst betrouwbare benadering is het bevragen van de netwerk status stack met gebruik van commando's zoals <code class="command">netstat -an</code> of <code class="command">lsof -i</code>. Deze methode is minder betrouwbaar omdat deze programma's niet met de machine verbinden vanaf het netwerk, maar in plaats daarvan controleren wat er op de server draait. Om deze reden zijn deze toepassingen vaak doelen voor aanvallers. Crackers proberen hun sporen te verbergen als ze ongeoorloofde poorten openen door het vervangen van <code class="command">netstat</code> en <code class="command">lsof</code> met hun eigen, veranderde versies.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security.html
index c287567..0b917d2 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Server_Security.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2. Server beveiliging</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an 
 iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.2. Server beveiliging" id="sect-Security_Guide-Server_Security" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.2. Server beveiliging</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2. Server beveiliging</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is 
 an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.2. Server beveiliging" id="sect-Security_Guide-Server_Security" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.2. Server beveiliging</h2></div></div></div><div class="para">
 		Als een systeem wordt gebruikt als een server op een publiek netwerk, wordt het een doel voor aanvallen. Het versterken van het systeem en afsluiten van services is daarom van groot belang voor de systeembeheerder.
 	</div><div class="para">
 		Voordat we ingaan op specifieke zaken, bekijken we eerste de volgende algemene aanwijzingen voor het verbeteren van de beveiliging van een server:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html
index 9ec4acd..3014004 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4. Hoe werkt inloggen met een Smart Card" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /></head><body class="toc_e
 mbeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO" id="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO"><div class="titlepage"><div><d
 iv keep-together.within-column="always"><h3 class="title">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4. Hoe werkt inloggen met een Smart Card" /><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)" /></head><body class="to
 c_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO" id="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO"><div class="titlepage"><div
 ><div keep-together.within-column="always"><h3 class="title">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</h3></div></div></div><div class="para">
 			Je kunt Firefox instellen om Kerberos te gebruiken voor eenmalig inschrijven. Om dit correct te laten werken, moet je jouw web browser instellen om jouw Kerberos legitimatie naar de juiste <abbr class="abbrev">KDC</abbr> te sturen. De volgende paragraaf beschrijft de configuratie veranderingen en andere vereisten om dit te bereiken.
 		</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					In de adresbalk van Firefox type je <strong class="userinput"><code>about:config</code></strong> om de lijst van de huidige configuratie opties te laten zien.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html
index ad6caed..7258283 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.2. Beginnen met je nieuwe Smart Card</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card" /></head><body class="toc_embeded "><div id="tocd
 iv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.2. Beginnen met je nieuwe Smart Card" id="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.2.
  Beginnen met je nieuwe Smart Card</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.2. Beginnen met je nieuwe Smart Card</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card" /></head><body class="toc_embeded "><div id="t
 ocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.2. Beginnen met je nieuwe Smart Card" id="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3
 .2. Beginnen met je nieuwe Smart Card</h3></div></div></div><div class="para">
 			Voordat je jouw smart card kunt gebruiken om in te loggen op je systeem en voordeel te hebben van de verbeterde beveiligings opties die deze technologie biedt, moet je eerst een paar basis installatie en configuratie stappen uitvoeren. Deze zijn hieronder beschreven.
 		</div><div class="note"><h2>Opmerking</h2><div class="para">
 				Deze paragraaf biedt een hoog-niveau overzicht om te beginnen met je smart card. Meer gedetailleerde informatie is beschikbaar in de Red Hat Certificate System Enterprise Security cliënt Guide.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html
index 18eacd4..3bb707e 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Beginnen met je nieuwe Smart Card" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4. Hoe werkt inloggen met een Smart Card" /></head><body cl
 ass="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card" id="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works"><div class="titlepa
 ge"><div><div keep-together.within-column="always"><h3 class="title">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Beginnen met je nieuwe Smart Card" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4. Hoe werkt inloggen met een Smart Card" /></head><body
  class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card" id="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works"><div class="titl
 epage"><div><div keep-together.within-column="always"><h3 class="title">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</h3></div></div></div><div class="para">
 			Smart cards zijn <em class="firstterm">in gebruik genomen</em> als ze een juist certificaat hebben ontvangen die is ondertekend door een geldige Certificaat Authoriteit (<abbr class="abbrev">CA</abbr>). Dit houdt verschillende stappen in, hieronder beschreven:
 		</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					De gebruiker stopt zijn smart card in de smart card lezer van zijn werkstation. Deze actie wordt herkend door de Enterprise Security cliënt (<abbr class="abbrev">ESC</abbr>).
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html
index ba64c8a..54d4f3e 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.4. Hoe werkt inloggen met een Smart Card</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" title="2.3.5. Het instellen van Firefox om Kerberos te geb
 ruiken voor SSO" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.4. Hoe werkt inloggen met een Smart Card" id="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_W
 orks"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.4. Hoe werkt inloggen met een Smart Card</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3.4. Hoe werkt inloggen met een Smart Card</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" /><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" title="2.3.5. Het instellen van Firefox om Kerberos te 
 gebruiken voor SSO" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.4. Hoe werkt inloggen met een Smart Card" id="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Logi
 n_Works"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.4. Hoe werkt inloggen met een Smart Card</h3></div></div></div><div class="para">
 			Deze paragraaf geeft een kort overzicht van het inloggen met gebruik van een smart card.
 		</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					als de gebruiker zijn smart card in de smart card lezer stopt, dan wordt deze actie herkend door de PAM faciliteit, die de gebruiker naar zijn PIN vraagt.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO.html
index cbbc797..1033100 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Single_Sign_on_SSO.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3. Eenmalig inschrijven (Single sign-on - SSO)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Het verifiëren van welke poorten luisteren" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Beginnen met je nieuwe Smart Card" /></head><body class="to
 c_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" id="sect-Security_Guide-Single_Sign_on_SSO" lang="nl-NL"><div class="titlepage"><div><d
 iv keep-together.within-column="always"><h2 class="title">2.3. Eenmalig inschrijven (Single sign-on - SSO)</h2></div></div></div><div class="section" title="2.3.1. Inleiding" id="sect-Security_Guide-Single_Sign_on_SSO-Introduction"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.1. Inleiding</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3. Eenmalig inschrijven (Single sign-on - SSO)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Het verifiëren van welke poorten luisteren" /><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Beginnen met je nieuwe Smart Card" /></head><body class=
 "toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)" id="sect-Security_Guide-Single_Sign_on_SSO" lang="nl-NL"><div class="titlepage"><div
 ><div keep-together.within-column="always"><h2 class="title">2.3. Eenmalig inschrijven (Single sign-on - SSO)</h2></div></div></div><div class="section" title="2.3.1. Inleiding" id="sect-Security_Guide-Single_Sign_on_SSO-Introduction"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.3.1. Inleiding</h3></div></div></div><div class="para">
 			De Fedora SSO functionaliteit reduceert het aantal keren dat Fedora bureaublad gebruikers hun wachtwoord moeten opgeven. Verscheidene belangrijke toepassingen gebruiken hetzelfde onderliggende authenticatie en autorisatie mechanisme zodat gebruikers op Fedora in kunnen loggen met het log-in scherm, en daarna hun wachtwoord niet opnieuw hoeven op te geven. Deze toepassingen worden hieronder beschreven.
 		</div><div class="para">
 			Bovendien kunnen gebruikers inloggen op hun machine zelfs als er geen netwerk is (<em class="firstterm">offline mode</em>) of als de netwerkverbinding onbetrouwbaar is, bijvoorbeeld draadloze toegang. In het laatste geval zullen services elegant afnemen.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html
index c7ac2e3..ec25418 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.4. Installeer ondertekende pakketten van goed bekende repositories</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Het aanpassen van automatische vernieuwingen" /><link rel="next" href="chap-Security_Guide-References.html" title="Hoofdstuk 7. Referenties" /></head><body class="toc_embeded "><div 
 id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-References.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.4. Installeer ondertekende pakketten van goed bekende repositories" id="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories"><div class="titlep
 age"><div><div keep-together.within-column="always"><h2 class="title">6.4. Installeer ondertekende pakketten van goed bekende repositories</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.4. Installeer ondertekende pakketten van goed bekende repositories</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Het aanpassen van automatische vernieuwingen" /><link rel="next" href="chap-Security_Guide-References.html" title="Hoofdstuk 7. Referenties" /></head><body class="toc_embeded "><d
 iv id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-References.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.4. Installeer ondertekende pakketten van goed bekende repositories" id="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories"><div class="tit
 lepage"><div><div keep-together.within-column="always"><h2 class="title">6.4. Installeer ondertekende pakketten van goed bekende repositories</h2></div></div></div><div class="para">
 			Software pakketten worden verspreid met behulp van repositories. Alle bekende repositories ondersteunen pakket ondertekening. Pakket ondertekening gebruikt publieke sleutel technologie om te bewijzen dat het pakket dat verspreid wordt door de repositorie niet veranderd is nadat de ondertekening was aangebracht. Dit biedt enige bescherming tegen het installeren van software die kwaadwillig veranderd kan zijn nadat het pakket is gemaakt maar voordat jij het downloadt.
 		</div><div class="para">
 			Het gebruiken van te veel repositories, onvertrouwde repositories, of repositories met niet ondertekende pakketten heeft een hoger risico voor het introduceren van kwaadwillige of kwetsbare code op je systeem. Wees voorzichtig als je repositories toevoegt aan yum/software vernieuwing.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html
index b592be2..21aa8e5 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.3. Het aanpassen van automatische vernieuwingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Installeer ondertekende pakketten
  van goed bekende repositories" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.3. Het aanpassen van automatische vernieuwingen" id="sect-Security_Guide-Soft
 ware_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">6.3. Het aanpassen van automatische vernieuwingen</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.3. Het aanpassen van automatische vernieuwingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud" /><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Installeer ondertekende pakket
 ten van goed bekende repositories" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.3. Het aanpassen van automatische vernieuwingen" id="sect-Security_Guide-S
 oftware_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">6.3. Het aanpassen van automatische vernieuwingen</h2></div></div></div><div class="para">
 			Fedora is configured to apply all updates on a daily schedule. If you want to change the how your system installs updates you must do so via '''Software Update Preferences'''. You can change the schedule, the type of updates to apply or to notify you of available updates.
 		</div><div class="para">
 			In Gnome, you can find controls for your updates at: <code class="code">System -&gt; Preferences -&gt; System -&gt; Software Updates</code>. In KDE it is located at: <code class="code">Applications -&gt; Settings -&gt; Software Updates</code>.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html
index 960fda1..eb0a104 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.2. Het plannen en configureren van beveiligingsvernieuwingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud" /><link rel="prev" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Het aanpassen van automatische vernieuwingen" /></head><body class="toc_embe
 ded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Software_Maintenance.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen" id="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates"><div class="titlepag
 e"><div><div keep-together.within-column="always"><h2 class="title">6.2. Het plannen en configureren van beveiligingsvernieuwingen</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>6.2. Het plannen en configureren van beveiligingsvernieuwingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud" /><link rel="prev" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud" /><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Het aanpassen van automatische vernieuwingen" /></head><body class="toc_e
 mbeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Software_Maintenance.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen" id="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates"><div class="title
 page"><div><div keep-together.within-column="always"><h2 class="title">6.2. Het plannen en configureren van beveiligingsvernieuwingen</h2></div></div></div><div class="para">
 			Alle software bevat fouten. Vaak kunnen deze fouten resulteren in een kwetsbaarheid die je machine blootstelt aan kwaadwillige gebruikers. Niet gecorrigeerde systemen zijn een veel voorkomende oorzaak van computer indringingen. Je moet een plan hebben om beveiligings correcties tijdig aan te brengen om deze kwetsbaarheden te verwijderen zodat ze niet uitgebuit kunnen worden.
 		</div><div class="para">
 			Voor thuis gebruikers, moeten beveiligings correcties zo spoedig mogelijk geïnstalleerd worden. Het instellen van automatische installatie van beveiligings vernieuwingen is een manier om er niet over na te hoeven denken, maar het heeft een klein risico dat iets een conflict met je instelling veroorzaakt of met andere software op je systeem.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html
index 249b8d0..f2b0573 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2. Optie velden</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers" /><link rel="next" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Toegangs controle" /></head><body class="toc_embeded "><div id=
 "tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2. Optie velden" id="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.2.2. Optie ve
 lden</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2.2. Optie velden</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers" /><link rel="next" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Toegangs controle" /></head><body class="toc_embeded "><div 
 id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2. Optie velden" id="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.2.2. Optie
  velden</h4></div></div></div><div class="para">
 				Naast de basis regels die toegang toestaan en verbieden ondersteunt de Fedora implementatie van TCO wrappersw ook uitbreidingen in toe toegangs controle taal met behulp van <em class="firstterm">optie velden</em>. Door optie velden in host toegangs regels te gebruiken, kunnen systeembeheerders een groot aantal taken uitvoeren, zoals het veranderen van het log gedrag, de toegangscontrole versterken, en shell commando's opstarten.
 			</div><div class="section" title="2.5.2.2.1. Logging" id="sect-Security_Guide-Option_Fields-Logging"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.2.2.1. Logging</h5></div></div></div><div class="para">
 					Optie velden laten beheerders op eenvoudige manier de log mogelijkheden en het prioriteits niveau van een regel veranderen door de <code class="option">severity</code> instructie te gebruiken.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html
index a1699f7..4ec157c 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5. Extra hulpbronnen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" title="2.5.4.3.4. Hulpbronnen beheer opties" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Nuttige TCP wrapper websites" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><if
 rame id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5. Extra hulpbronnen" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.5. Extra
  hulpbronnen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.5. Extra hulpbronnen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" title="2.5.4.3.4. Hulpbronnen beheer opties" /><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Nuttige TCP wrapper websites" /></head><body class="toc_embeded "><div id="tocdiv" class="toc">
 <iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5. Extra hulpbronnen" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.5. Ex
 tra hulpbronnen</h3></div></div></div><div class="para">
 			Meer informatie over TCP wrappers en <code class="systemitem">xinetd</code> is beschikbaar in de systeem documentatie en op het Internet.
 		</div><div class="section" title="2.5.5.1. Geïnstalleerde TCP wrapper documentatie" id="sect-Security_Guide-Additional_Resources-Installed_TCP_Wrappers_Documentation"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.5.1. Geïnstalleerde TCP wrapper documentatie</h4></div></div></div><div class="para">
 				De documentatie op je systeem is een goede plek om te beginnen voor het zoeken naar extra configuratie opties voor TCP wrappers, <code class="systemitem">xinetd</code>, en toegangs controle.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html
index 968bff5..c8661fd 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2. Configuratie bestanden voor TCP wrappers</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../
 ../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2. Configuratie bestanden voor TCP wrappers" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.2. Configuratie bestanden voor TCP wrappers</h3></div></div><
 /div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2. Configuratie bestanden voor TCP wrappers</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../
 ../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2. Configuratie bestanden voor TCP wrappers" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.2. Configuratie bestanden voor TCP wrappers</h3></div></di
 v></div><div class="para">
 			Om te bepalen of het een cliënt toegestaan is met een service te verbinden, refereren TCP wrappers naar de volgende twee bestanden, gewoonlijk aangegeven als <em class="firstterm">hosts toegangs</em> bestanden:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="filename">/etc/hosts.allow</code>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html
index f6b94d1..c97c41b 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.3. xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Uitbreidingen" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This
  is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.3. xinetd" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.3. xinetd</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.3. xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /><link rel="prev" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Uitbreidingen" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">T
 his is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.3. xinetd" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.3. xinetd</h3></div></div></div><div class="para">
 			Het <code class="systemitem">xinetd</code> daemon is een met TCP gewrapte <em class="firstterm">super service</em> welke toegang controleert naar een subset van populaire netwerk services, inclusief FTP, IMAP, en Telnet. Het biedt ook service specifieke configuratie opties voor toegangs controle, verbeterde logging, verbinding, omleiding, en hulpbron gebruiks controle.
 		</div><div class="para">
 			Als een cliënt probeert te verbinden met een netwerk service die gecontroleerd wordt door <code class="systemitem">xinetd</code>, ontvangt de super service het verzoek en controleert of er TCP wrapper toegangs regels zijn.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html
index ac07c24..dac255c 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4. xinetd configuratie bestanden</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd" /><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. De /etc/xinetd.d/ map" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../
 toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4. xinetd configuratie bestanden" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.4. xinetd configuratie bestanden</h3></div></div></div><div class="p
 ara">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4. xinetd configuratie bestanden</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd" /><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. De /etc/xinetd.d/ map" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../
 ../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4. xinetd configuratie bestanden" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.4. xinetd configuratie bestanden</h3></div></div></div><div class
 ="para">
 			De cofiguratie bestanden voor <code class="systemitem">xinetd</code> zijn de volgende:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="filename">/etc/xinetd.conf</code> — Het globale <code class="systemitem">xinetd</code> configuratie bestand.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd.html
index 69a87ec..a92ff58 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-TCP_Wrappers_and_xinetd.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5. TCP wrappers en xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Nuttige PAM websites" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe 
 id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.5. TCP wrappers en xinetd" id="sect-Security_Guide-TCP_Wrappers_and_xinetd" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.5. TCP wrappers en 
 xinetd</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5. TCP wrappers en xinetd</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Nuttige PAM websites" /><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><ifra
 me id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.5. TCP wrappers en xinetd" id="sect-Security_Guide-TCP_Wrappers_and_xinetd" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.5. TCP wrappers 
 en xinetd</h2></div></div></div><div class="para">
 		Controlling access to network services is one of the most important security tasks facing a server administrator. Fedora provides several tools for this purpose. For example, an <code class="command">iptables</code>-based firewall filters out unwelcome network packets within the kernel's network stack. For network services that utilize it, <em class="firstterm">TCP Wrappers</em> add an additional layer of protection by defining which hosts are or are not allowed to connect to "<span class="emphasis"><em>wrapped</em></span>" network services. One such wrapped network service is the <code class="systemitem">xinetd</code> <span class="emphasis"><em>super server</em></span>. This service is called a super server because it controls connections to a subset of network services and further refines access control.
 	</div><div class="para">
 		<a class="xref" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#figu-Security_Guide-TCP_Wrappers_and_xinetd-Access_Control_to_Network_Services" title="Figuur 2.9. Toegangs controle voor netwerk services">Figuur 2.9, “Toegangs controle voor netwerk services”</a> is a basic illustration of how these tools work together to protect network services.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html
index 4545e12..d2fff2d 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html
@@ -1,9 +1,9 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.3. Onoplettend beheer</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Niet gecorrigeerde services" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Inherent onveilige services" /></head><body class="toc_emb
 eded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.3. Onoplettend beheer" id="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration"><div class="titlepage"><div><div keep-together.within-column=
 "always"><h4 class="title">1.3.3.3. Onoplettend beheer</h4></div></div></div><div class="para">
-				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<sup>[<a id="id2723526" href="#ftn.id2723526" class="footnote">10</a>]</sup> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.3. Onoplettend beheer</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Niet gecorrigeerde services" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Inherent onveilige services" /></head><body class="toc_
 embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.3. Onoplettend beheer" id="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration"><div class="titlepage"><div><div keep-together.within-colu
 mn="always"><h4 class="title">1.3.3.3. Onoplettend beheer</h4></div></div></div><div class="para">
+				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<sup>[<a id="id1427490" href="#ftn.id1427490" class="footnote">10</a>]</sup> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
 			</div><div class="para">
 				Sommige beheerders laten na hun servers en werkstations te corrigeren, terwijl anderen nalaten om de log boodschappen van de systeem kernel of het netwerk verkeer te bekijken. Een andere veel voorkomende fout is het onveranderd laten van standaard wachtwoorden of sleutels voor services. Bijvoorbeeld, sommige databases hebben standaard beheerswachtwoorden omdat de database ontwikkelaars aannemen dat de systeembeheerder deze wachtwoorden onmiddellijk na de installatie zal veranderen. Als een database beheerder nalaat om dit wachtwoord te veranderen, kan zelfs een onervaren cracker het algemeen bekende standaard wachtwoord gebruiken om beheersrechten te krijgen voor de database. Dit zijn slechts een paar voorbeelden van het veroorzaken van in gevaar gebrachte servers door onoplettend beheer.
-			</div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id2723526" href="#id2723526" class="para">10</a>] </sup>
+			</div><div class="footnotes"><br /><hr /><div class="footnote"><p><sup>[<a id="ftn.id1427490" href="#id1427490" class="para">10</a>] </sup>
 					http://www.sans.org/resources/errors.php
 				</p></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Terug</strong>1.3.3.2. Niet gecorrigeerde services</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Volgende</strong>1.3.3.4. Inherent onveilige services</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html
index b38453b..529a8e3 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.4. Inherent onveilige services</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Onoplettend beheer" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en 
 beveiliging van thuis PC's" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.4. Inherent onveilige services" id="sect-Security_Guide-Threats_to_Server_Securi
 ty-Inherently_Insecure_Services"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.3.4. Inherent onveilige services</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.4. Inherent onveilige services</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Onoplettend beheer" /><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations 
 en beveiliging van thuis PC's" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.4. Inherent onveilige services" id="sect-Security_Guide-Threats_to_Server_Sec
 urity-Inherently_Insecure_Services"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.3.4. Inherent onveilige services</h4></div></div></div><div class="para">
 				Zelfs de meest waakzame organisatie kan het slachtoffer worden van kwetsbaarheden als de netwerk services die ze kiezen inherent onveilig zijn. Bijvoorbeeld, er zijn veel services ontwikkeld met de aanname dat ze gebruikt worden in betrouwbare netwerken; deze aanname vervalt echter zodra de service beschikbaar komt via het Internet — welke zelf inherent onbetrouwbaar is.
 			</div><div class="para">
 				Een categorie van onveilige netwerk sevices zijn degene die niet-versleutelde gebruikersnamen en wachtwoorden vereisen voor authenticatie. Telnet en FTP zijn zulke services. Als pakketsnuffel software het verkeer tussen de gebruiker op afstand en zo'n service volgt, kunnen gebruikersnamen en wachtwoorden eenvoudig onderschept worden.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html
index 067affa..09c0ff3 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.2. Niet gecorrigeerde services</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Onoplettend beheer" /></head><bod
 y class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.2. Niet gecorrigeerde services" id="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services"><div class="titlepage"><div><div ke
 ep-together.within-column="always"><h4 class="title">1.3.3.2. Niet gecorrigeerde services</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.3.2. Niet gecorrigeerde services</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Onoplettend beheer" /></head><
 body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.2. Niet gecorrigeerde services" id="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services"><div class="titlepage"><div><div
  keep-together.within-column="always"><h4 class="title">1.3.3.2. Niet gecorrigeerde services</h4></div></div></div><div class="para">
 				De meeste server toepassingen die onderdeel zijn van een standaard installatie zijn solide, goed geteste stukken software. Omdat ze al vele jaren in productie omgevingen gebruikt worden, is hun code grondig verbeterd en veel van de fouten zijn gevonden en gerepareerd.
 			</div><div class="para">
 				Er is echter niet zo iets als perfecte software en er is altijd ruimte voor verdere verbeteringen. Bovendien is nieuwere software meestal niet zo grondig getest als je zou verwachten, om dat het pas kort in productie omgevingen aanwezig is of omdat het misschien niet zo populair is als andere server software.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html
index 1f6c3e6..f5782cc 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.4.2. Kwetsbare cliënt toepassingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's" /><link rel="next" href="sect-Security_Guide-Common_Exploits_and_Atta
 cks.html" title="1.4. Veel voorkomende uitbuitingen en aanvallen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.4.2. Kwetsbare cliënt toepassingen" id="sect-Security_Guide-Threats_t
 o_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.4.2. Kwetsbare cliënt toepassingen</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.3.4.2. Kwetsbare cliënt toepassingen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's" /><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's" /><link rel="next" href="sect-Security_Guide-Common_Exploits_and_A
 ttacks.html" title="1.4. Veel voorkomende uitbuitingen en aanvallen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.4.2. Kwetsbare cliënt toepassingen" id="sect-Security_Guide-Threat
 s_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.3.4.2. Kwetsbare cliënt toepassingen</h4></div></div></div><div class="para">
 				Als een beheerder een volledig veilige en gecorrigeerde server heeft, betekent dat niet dat gebruikers op afstand veilig zijn wanneer ze er toegang naar krijgen. Bijvoorbeeld, als de server Telnet of FTP services aanbiedt over een publiek netwerk, kan een aanvaller de leesbare tekst gebruikersnamen en wachtwoorden bemachtigen als ze passeren over het netwerk, en daarna de account informatie gebruiken voor toegang naar het werkstation van de gebruiker op afstand.
 			</div><div class="para">
 				Zelfs als veilige protocols gebruikt worden, zoals SSH, kan een gebruiker op afstand kwetsbaar zijn voor bepaalde aanvallen als ze hun cliënt toepassingen niet vernieuwen. Bijvoorbeeld, v.1 SSH cliënten zijn kwetsbaar voor een X-doorsturen aanval van kwaadwillige SSH servers. Zodra er verbonden is met de server, kan de aanvaller op zijn gemak alle toetsaanslagen en muisklikken die de gebruiker maakt onderscheppen over het netwerk. Dit probleem is gerepareerd in het v.2 SSH protocol, maar het is de taak van de gebruiker om bij te houden welke toepassingen zulke kwetsbaarheden hebben en ze te vernieuwen zoals vereist.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Applying_the_Changes.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Applying_the_Changes.html
index 25e69b3..577cda9 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Applying_the_Changes.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Applying_the_Changes.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.4. De veranderingen toepassen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Ondertekende pakketten installeren" /><link rel="next" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../
 ../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.4. De veranderingen toepassen" id="sect-Security_Guide-Updating_Packages-Applying_the_Changes"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.4. De veranderingen toepassen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.4. De veranderingen toepassen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Ondertekende pakketten installeren" /><link rel="next" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="
 ../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.4. De veranderingen toepassen" id="sect-Security_Guide-Updating_Packages-Applying_the_Changes"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.4. De veranderingen toepassen</h3></div></div></div><div class="para">
 			Na het downloaden en installeren van beveiligings errata en vernieuwingen, is het belangrijk om het gebruik van de oudere software te stoppen en te beginnen met het gebruiken van de nieuwe software. Hoe dit gedaan wordt hangt af van het type software dat vernieuwd is. De volgende lijst somt de algemene categorieën van software op en geeft instructies voor het gebruik van de vernieuwde versies na een pakket vernieuwing.
 		</div><div class="note"><h2>Opmerking</h2><div class="para">
 				In het algemeen is het systeem opnieuw opstarten de veiligste manier om te verzekeren dat de laatste versie van een software pakket wordt gebruikt; deze optie is echter niet altijd vereist, of beschikbaar voor de systeembeheerder.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html
index 9c7328d..5ec909a 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.3. Ondertekende pakketten installeren</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Ondertekende pakketten verifiëren" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. De veranderingen toepassen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfram
 e" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.3. Ondertekende pakketten installeren" id="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.3. Ondertekende pakketten installeren<
 /h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.3. Ondertekende pakketten installeren</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Ondertekende pakketten verifiëren" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. De veranderingen toepassen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocf
 rame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.3. Ondertekende pakketten installeren" id="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.3. Ondertekende pakketten installer
 en</h3></div></div></div><div class="para">
 			Het installeren van de meeste pakketten kan veilig gedaan worden (behalve voor kernel pakketten) met het volgende commando:
 		</div><pre class="screen"><code class="command">rpm -Uvh /tmp/updates/*.rpm</code>
 </pre><div class="para">
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html
index a6cd0a7..ee79cc8 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.2. Ondertekende pakketten verifiëren</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen" /><link rel="prev" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Ondertekende pakketten installeren" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../
 ../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Security_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.2. Ondertekende pakketten verifiëren" id="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.2. Ondertekende pakketten verifiëren</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.5.2. Ondertekende pakketten verifiëren</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen" /><link rel="prev" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen" /><link rel="next" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Ondertekende pakketten installeren" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="
 ../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Security_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.2. Ondertekende pakketten verifiëren" id="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.5.2. Ondertekende pakketten verifiëren</h3></div></div></div><div class="para">
 			Alle Fedora pakketten zijn ondertekend met de Fedora <em class="firstterm">GPG</em> sleutel. GPG staat voor GNU Privacy Guard, of GnuPG, een vrij software pakket voor het verzekeren van authenticiteit van verspreide bestanden. Bijvoorbeeld, een privé sleutel (geheime sleutel) sluit het pakket af terwijl een publieke sleutel het pakket opent en verifieert. Als de publieke sleutel die door Fedora geleverd wordt tijdens de RPM verificatie niet past met de geheime sleutel, kan het pakket veranderd zijn en kan daarom niet vertrouwd worden.
 		</div><div class="para">
 			Het RPM programma in Fedora probeert automatisch de GPG ondertekening van een RPM pakket te verifiëren voordat het geïnstalleerd wordt. Als de Fedora GPG sleutel niet geïnstalleerd is, doe dat dan van een veilige, statische locatie, zoals een Fedora installatie CD-ROM of DVD.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html
index ac70d2a..3821391 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3.2. Basis firewall tactieken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken" /><link rel="prev" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken" /><link rel="next" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Opslaan en terugzetten van IPTables regels" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="t
 oc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3.2. Basis firewall tactieken" id="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.3.2. Basis firewall tactieken</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3.2. Basis firewall tactieken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken" /><link rel="prev" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken" /><link rel="next" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Opslaan en terugzetten van IPTables regels" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class
 ="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3.2. Basis firewall tactieken" id="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.3.2. Basis firewall tactieken</h4></div></div></div><div class="par
 a">
 				Het vaststellen van basis firewall tactieken maakt een ondergrond voor het bouwen van meer gedetaileerde, door de gebruiker gedefinieerde regels.
 			</div><div class="para">
 				Elke <code class="command">iptables</code> keten bestaat uit een standaard tactiek, en geen of een aantal regels die samenwerken met de standaard tactiek om het gehele regelstelsel voor de firewall te definiëren.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html
index 4ebf88a..588de43 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3.3. Opslaan en terugzetten van IPTables regels</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken" /><link rel="prev" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Basis firewall tactieken" /><link rel="next" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Algemene IPTables filtering" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" 
 class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3.3. Opslaan en terugzetten van IPTables regels" id="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.3.3. Opslaan en terugzetten van I
 PTables regels</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8.3.3. Opslaan en terugzetten van IPTables regels</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken" /><link rel="prev" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Basis firewall tactieken" /><link rel="next" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Algemene IPTables filtering" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfram
 e" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3.3. Opslaan en terugzetten van IPTables regels" id="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.8.3.3. Opslaan en terugzetten va
 n IPTables regels</h4></div></div></div><div class="para">
 				Veranderingen in <code class="command">iptables</code> zijn tijdelijk, als het systeem opnieuw opgestart wordt of als de <code class="command">iptables</code> service opnieuw opgestart wordt, worden de regels automatisch verwijderd en de standaarden worden terug gezet. Om de regels te bewaren zodat ze geladen worden als de <code class="command">iptables</code> service gestart wordt, gebruik je het volgende commando:
 			</div><pre class="screen">[root at myServer ~ ] # service iptables save
 </pre><div class="para">
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html
index 2f71856..b1b3aa4 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.4. Een IPsec verbinding maken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. IPsec installatie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../.
 ./../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.4. Een IPsec verbinding maken" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding ma
 ken</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.4. Een IPsec verbinding maken</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. IPsec installatie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src=".
 ./../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.4. Een IPsec verbinding maken" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding
  maken</h3></div></div></div><div class="para">
 			Een <abbr class="abbrev">IPsec</abbr> verbinding is opgedeeld in twee logische fases. In fase 1 initialiseert een <abbr class="abbrev">IPsec</abbr> node de verbinding met de node of het netwerk op afstand. De node of het netwerk op afstand controleert de legitimaties van de aanvragende node en beide partijen onderhandelen over de authenticatie methode voor de verbinding.
 		</div><div class="para">
 			Op Fedora systemen gebruikt een <abbr class="abbrev">IPsec</abbr> verbinding de <em class="firstterm">pre-shared key</em> methode van <abbr class="abbrev">IPsec</abbr> node authenticatie. In een pre-shared key <abbr class="abbrev">IPsec</abbr> verbinding, moeten beide hosts dezelfde sleutel gebruiken om verder te gaan naar fase 2 van de <abbr class="abbrev">IPsec</abbr> verbinding.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html
index 5eb539e..4434cf6 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.3. IPsec</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPN's and Fedora" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Een IPsec verbinding maken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" clas
 s="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.3. IPsec" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.3. IPsec</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.3. IPsec</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPN's and Fedora" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Een IPsec verbinding maken" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" c
 lass="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.3. IPsec" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.3. IPsec</h3></div></div></div><div class="para">
 			Fedora ondersteunt <abbr class="abbrev">IPsec</abbr> voor het verbinden van hosts op afstand naar netwerken met gebruik van een beveiligde tunnel op een gemeenschappelijk dragers netwerk zoals het Internet. <abbr class="abbrev">IPsec</abbr> kan geïmplementeerd worden door gebruik van een host-naar-host (een computer werkstation naar een ander) of netwerk-naar-netwerk (een <acronym class="acronym">LAN</acronym>/<acronym class="acronym">WAN</acronym> naar een ander) configuratie
 		</div><div class="para">
 			De <abbr class="abbrev">IPsec</abbr> implementatie in Fedora gebruikt <em class="firstterm">Internet Key Exchange</em> (<em class="firstterm">IKE</em>), een protocol geïmplementeerd door de Internet Engineering Task Force (<acronym class="acronym">IETF</acronym>), gebruikt voor wederzijdse authenticatie en beveiligde samenwerking tussen verbindende systemen.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html
index 5e94cf3..5b7160d 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.6. IPsec host-naar-host configuratie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. IPsec installatie" /><link rel="next" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie" /></head><body class="t
 oc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.6. IPsec host-naar-host configuratie" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration"><div class="t
 itlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.6. IPsec host-naar-host configuratie</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.6. IPsec host-naar-host configuratie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. IPsec installatie" /><link rel="next" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie" /></head><body class
 ="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.6. IPsec host-naar-host configuratie" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration"><div class
 ="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.6. IPsec host-naar-host configuratie</h3></div></div></div><div class="para">
 			IPsec kan ingesteld worden om een bureaublad of werkstation (host) te verbinden met een andere door het gebruiken van een host-naar-host verbinding. Dit type verbinding gebruikt het netwerk waarmee iedere host verbonden is om een beveiligde tunnel tussen beide hosts te maken. De vereisten voor een host-naar-host verbinding zijn minimaal, evenals de instelling van <abbr class="abbrev">IPsec</abbr> op iedere host. De hosts hebben alleen een specifieke verbinding naar een draag netwerk nodig (zoals het Internet) en Fedora om de <abbr class="abbrev">IPsec</abbr> verbinding te maken.
 		</div><div class="section" title="2.7.6.1. Host-naar-host verbinding" id="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Host_to_Host_Connection"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.7.6.1. Host-naar-host verbinding</h4></div></div></div><div class="para">
 				Een host-naar-host <abbr class="abbrev">IPsec</abbr> verbinding is een versleutelde verbinding tussen twee systemen, welke beide <abbr class="abbrev">IPsec</abbr> draaien met dezelfde authenticatie sleutel. Als de <abbr class="abbrev">IPsec</abbr> verbinding actief is, wordt alle netwerkverkeer tussen de twee hosts versleuteld.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html
index c1249a3..6a0dc0e 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.5. IPsec installatie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Een IPsec verbinding maken" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie" /></head><body class="toc_embeded "><div id
 ="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.5. IPsec installatie" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation"><div class="titlepage"><div><div keep-together.within-column="a
 lways"><h3 class="title">2.7.5. IPsec installatie</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.5. IPsec installatie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Een IPsec verbinding maken" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie" /></head><body class="toc_embeded "><div
  id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.5. IPsec installatie" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation"><div class="titlepage"><div><div keep-together.within-column
 ="always"><h3 class="title">2.7.5. IPsec installatie</h3></div></div></div><div class="para">
 			Het implementeren van <abbr class="abbrev">IPsec</abbr> vereist dat het <code class="filename">ipsec-tools</code> RPM pakket geïnstalleerd wordt op alle <abbr class="abbrev">IPsec</abbr> hosts (als een host-naar-host configuratie gebruikt wordt) of routers (als een netwerk-naar-netwerk configuratie gebruikt wordt). Het RPM pakket bevat essentiele bibliotheken, daemons, en configuratie bestanden voor het instellen van de <abbr class="abbrev">IPsec</abbr> verbinding, inclusief:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="command">/sbin/setkey</code> — manipuleert het sleutel beheer en beveiligings attributen van <abbr class="abbrev">IPsec</abbr> in de kernel. Dit programma wordt gecontroleerd door de <code class="command">racoon</code> sleutel beheers daemon. Refereer naar de <code class="command">setkey</code>(8) manual pagina voor meer informatie.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html
index 3ec55b4..3d59e7c 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.7. IPsec netwerk-naar-netwerk configuratie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie" /><link rel="next" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2
 . Handmatige IPsec netwerk-naar-netwerk configuratie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.7. IPsec netwerk-naar-netw
 erk configuratie" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.7. IPsec netwerk-naar-netwerk configuratie</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.7. IPsec netwerk-naar-netwerk configuratie</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie" /><link rel="next" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.
 7.2. Handmatige IPsec netwerk-naar-netwerk configuratie" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.7. IPsec netwerk-naar-n
 etwerk configuratie" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.7. IPsec netwerk-naar-netwerk configuratie</h3></div></div></div><div class="para">
 			IPsec can also be configured to connect an entire network (such as a <acronym class="acronym">LAN</acronym> or <acronym class="acronym">WAN</acronym>) to a remote network using a network-to-network connection. A network-to-network connection requires the setup of <abbr class="abbrev">IPsec</abbr> routers on each side of the connecting networks to transparently process and route information from one node on a <acronym class="acronym">LAN</acronym> to a node on a remote <acronym class="acronym">LAN</acronym>. <a class="xref" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html#figu-Security_Guide-IPsec_Network_to_Network_Configuration-A_network_to_network_IPsec_tunneled_connection" title="Figuur 2.11. A network-to-network IPsec tunneled connection">Figuur 2.11, “A network-to-network <abbr class="abbrev">IPsec</abbr> tunneled connection”</a> shows a network-to-network <abbr class="abbrev">IPsec</abbr> tunneled connection.
 		</div><div class="figure" title="Figuur 2.11. A network-to-network IPsec tunneled connection" id="figu-Security_Guide-IPsec_Network_to_Network_Configuration-A_network_to_network_IPsec_tunneled_connection"><div class="figure-contents"><div class="mediaobject"><img src="images/n-t-n-ipsec-diagram.png" width="444" alt="A network-to-network IPsec tunneled connection" /><div class="longdesc"><div class="para">
 						A network-to-network <abbr class="abbrev">IPsec</abbr> tunneled connection
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html
index 663a5d4..b70e3ca 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.8. Het starten en stoppen van een IPsec verbinding</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie" /><link rel="next" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /></head><body class="toc_embeded "><div
  id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.8. Het starten en stoppen van een IPsec verbinding" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection"><div class="titlepage"><div><div k
 eep-together.within-column="always"><h3 class="title">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.8. Het starten en stoppen van een IPsec verbinding</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie" /><link rel="next" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls" /></head><body class="toc_embeded "><
 div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.8. Het starten en stoppen van een IPsec verbinding" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection"><div class="titlepage"><div><di
 v keep-together.within-column="always"><h3 class="title">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</h3></div></div></div><div class="para">
 			Als de <abbr class="abbrev">IPsec</abbr> verbinding niet ingesteld is om op te starten tijdens het opstarten van de computer, kun je het besturen vanaf de commandoregel.
 		</div><div class="para">
 			Om de verbinding te starten, gebruik je het volgende commando voor elke host voor host-naar-host IPsec, of iedere <abbr class="abbrev">IPsec</abbr> router voor netwerk-naar-netwerk IPsec:
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html
index 31c843e..93d835f 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.2. VPN's and Fedora</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.htm
 l">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.2. VPN's and Fedora" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.2. VPN's and Fedora</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7.2. VPN's and Fedora</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.
 html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.2. VPN's and Fedora" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.7.2. VPN's and Fedora</h3></div></div></div><div class="para">
 			Fedora biedt verschillende opties wat betreft de implementatie van software oplossingen voor een beveiligde verbinding naar een <acronym class="acronym">WAN</acronym>. <em class="firstterm">Internet Protocol Security</em> (<acronym class="acronym">IPsec</acronym>) is de ondersteunde <abbr class="abbrev">VPN</abbr> implementatie voor Fedora, en voldoet in voldoende mate aan de gebruikersbehoeften van bedrijven met buitenkantoren of gebruikers op afstand.
 		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Terug</strong>2.7. Virtuele privé netwerken (VPN's)</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Volgende</strong>2.7.3. IPsec</a></li></ul></body></html>
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs.html
index 655d9cb..c2697a2 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Virtual_Private_Networks_VPNs.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7. Virtuele privé netwerken (VPN's)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Nuttige Kerberos websites" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPN's and Fedora" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" c
 lass="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.7. Virtuele privé netwerken (VPN's)" id="sect-Security_Guide-Virtual_Private_Networks_VPNs" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.7. Virtuele privé netwer
 ken (VPN's)</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7. Virtuele privé netwerken (VPN's)</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen" /><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Nuttige Kerberos websites" /><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPN's and Fedora" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe
 " class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.7. Virtuele privé netwerken (VPN's)" id="sect-Security_Guide-Virtual_Private_Networks_VPNs" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.7. Virtuele privé net
 werken (VPN's)</h2></div></div></div><div class="para">
 		Bedrijven met verscheidene satelliet kantoren verbinden vaak met elkaar met specifieke lijnen voor effectiviteit en bescherming van gevoelige data tijdens de overdracht. Bijvoorbeeld, veel bedrijven gebruiken frame relay of <em class="firstterm">Asynchronous Transfer Mode</em> (<acronym class="acronym">ATM</acronym>) lijnen voor een eindpunt-naar-eindpunt oplossing om een kantoor met andere te verbinden. Dit kan een duur voorstel zijn, in het bijzonder voor bedrijven van gemiddelde grootte (<acronym class="acronym">SMB</acronym>'s) die uit willen breiden zonder de hoge kosten te betalen die behoren bij specifieke digitale circuits voor grote ondernemingen.
 	</div><div class="para">
 		Om aan deze behoeft te voldoen, werden <em class="firstterm">Virtuele privé netwerken</em> (<abbr class="abbrev">VPN</abbr>'s) ontwikkeld. Door het opvolgen van dezelfde functionele principes als specifieke circuits, staan <abbr class="abbrev">VPN</abbr>'s beveiligde digitale communicatie toe tussen twee partijen (of netwerken), waarmee een <em class="firstterm">Wide Area Network</em> (<acronym class="acronym">WAN</acronym>) gemaakt wordt van bestaande <em class="firstterm">Local Area Networks</em> (<acronym class="acronym">LAN</acronym>'s). Waarin het verschilt van frame relay of ATM is het transport medium. <abbr class="abbrev">VPN</abbr>'s verzenden over IP met gebruik van datagrams als de transport laag, wat het een veilig kanaal door het Internet maakt naar een bedoelde bestemming. De meeste vrije <abbr class="abbrev">VPN</abbr> implementaties bevatten open standaard versleutelings methoden om de data tijdens de overdracht verder te maskeren.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html
index 0b76f5f..68acb1f 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.2. Het definiëren van onderzoeken en testen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfram
 e" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.2. Het definiëren van onderzoeken en testen" id="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.2.2. Het definiëren van onderzoe
 ken en testen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.2. Het definiëren van onderzoeken en testen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocf
 rame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.2. Het definiëren van onderzoeken en testen" id="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.2.2. Het definiëren van onder
 zoeken en testen</h3></div></div></div><div class="para">
 			Kwetbaarheidsonderzoeken kunnen verdeeld worden in twee types:<em class="firstterm">van buiten naar binnen kijken</em> en <em class="firstterm">van binnen rondkijken</em>.
 		</div><div class="para">
 			When performing an outside looking in vulnerability assessment, you are attempting to compromise your systems from the outside. Being external to your company provides you with the cracker's viewpoint. You see what a cracker sees — publicly-routable IP addresses, systems on your <em class="firstterm">DMZ</em>, external interfaces of your firewall, and more. DMZ stands for "demilitarized zone", which corresponds to a computer or small subnetwork that sits between a trusted internal network, such as a corporate private LAN, and an untrusted external network, such as the public Internet. Typically, the DMZ contains devices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers, SMTP (e-mail) servers and DNS servers.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html
index f7388cf..fadbcbc 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3. Het evalueren van de gereedschappen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Het definiëren van onderzoeken en testen" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe
 " class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3. Het evalueren van de gereedschappen" id="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.2.3. Het evalueren van de gereedschap
 pen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2.3. Het evalueren van de gereedschappen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling" /><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Het definiëren van onderzoeken en testen" /><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocfr
 ame" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3. Het evalueren van de gereedschappen" id="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.2.3. Het evalueren van de gereedsc
 happen</h3></div></div></div><div class="para">
 			Een onderzoek kan beginnen met het gebruik van een informatie verzamel gereedschap. Als het gehele netwerk onderzocht wordt, maak dan eerst een plattegrond om de host te vinden die er in draaien. Zodra die gevonden zijn, bekijk dan iedere host individueel. Concentreren op deze hosts vereist een andere set gereedschappen. Te weten welke gereedschappen gebruikt moeten worden kan de beslissende stap zijn in het vinden van kwetsbaarheden.
 		</div><div class="para">
 			Net als in elk onderdeel van het dagelijkse leven, zijn er veel verschillende gereedschappen die dezelfde taak uitvoeren. Dit concept is ook van toepassing op het uitvoeren van kwetbaarheidsonderzoeken. Er zijn gereedschappen specifiek voor operating systemen, toepassingen, en zelfs netwerken (afhankelijk van het gebruikte protocol). Sommige gereedschappen zijn gratis, andere niet. Sommige gereedschappen zijn intuïtief en gemakkelijk te gebruiken, terwijl andere cryptisch en slecht gedocumenteerd zijn maar met eigenschappen die andere niet hebben.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment.html
index 3f2f0c4..33b617f 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-Vulnerability_Assessment.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2. Kwetsbaarheid beoordeling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /><link rel="prev" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Het definiëren van onderzoeken en testen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" cl
 ass="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Security_Overview.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.2. Kwetsbaarheid beoordeling" id="sect-Security_Guide-Vulnerability_Assessment" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.2. Kwetsbaarheid beoordeling</h2></div></div></div><di
 v class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>1.2. Kwetsbaarheid beoordeling</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /><link rel="prev" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht" /><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Het definiëren van onderzoeken en testen" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe"
  class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Security_Overview.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.2. Kwetsbaarheid beoordeling" id="sect-Security_Guide-Vulnerability_Assessment" lang="nl-NL"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.2. Kwetsbaarheid beoordeling</h2></div></div></div>
 <div class="para">
 		Met voldoende tijd, hulpbronnen, en motivatie, kan een cracker in bijna elk systeem inbreken. Uiteindelijk kunnen alle beveiligings procedures en technologiën die nu beschikbaar zijn, niet garanderen dat elk systeem volledig beveiligd is tegen indringing. Routers helpen de gateways naar het Internet te beveiligen. Firewalls helpen om de randen van het netwerk te beveiligen. Virtual Private Networks geven data veilig door met een versleutelde stroom. Indringings detectie systemen waarschuwen je voor kwaadwillige activiteiten. Het succes van al deze technologiën hangt echter af van een aantal variabelen, zoals:
 	</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 				De deskundigheid van de werknemers die verantwoordelijk zijn voor het instellen, bewaken, en onderhouden van de technologiën.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html
index 76d26f9..e365dc9 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3. xinetd configuratie bestanden veranderen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden" /><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. De /etc/xinetd.d/ map" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Toegangs controle opties" /></head><body cl
 ass="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3. xinetd configuratie bestanden veranderen" id="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files"><div cla
 ss="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.4.3. xinetd configuratie bestanden veranderen</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.3. xinetd configuratie bestanden veranderen</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden" /><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. De /etc/xinetd.d/ map" /><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Toegangs controle opties" /></head><body
  class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3. xinetd configuratie bestanden veranderen" id="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files"><div 
 class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">2.5.4.3. xinetd configuratie bestanden veranderen</h4></div></div></div><div class="para">
 				Een aantal instructies is beschikbaar voor service de beschermd worden door <code class="systemitem">xinetd</code>. Deze paragraaf laat een aantal veel gebruikte opties zien.
 			</div><div class="section" title="2.5.4.3.1. Logging opties" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Logging_Options"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">2.5.4.3.1. Logging opties</h5></div></div></div><div class="para">
 					De volgende opties zijn beschikbaar voor zowel <code class="filename">/etc/xinetd.conf</code> als de service specifieke bestanden in de <code class="filename">/etc/xinetd.d/</code> map.
diff --git a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html
index 8cf5d3a..d320943 100644
--- a/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html
+++ b/public_html/nl-NL/Fedora/11/html/Security_Guide/sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.2. De /etc/xinetd.d/ map</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden" /><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen" /></head><body
  class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.2. De /etc/xinetd.d/ map" id="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory"><div class="titlepage"><div><div
  keep-together.within-column="always"><h4 class="title">2.5.4.2. De /etc/xinetd.d/ map</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.4.2. De /etc/xinetd.d/ map</title><link rel="stylesheet" href="Common_Content/css/default.css" type="text/css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 1.99" /><meta name="package" content="Fedora-Security_Guide-11-nl-NL-1.0-19" /><link rel="home" href="index.html" title="Beveiligings gids" /><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden" /><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden" /><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen" /></head><b
 ody class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.2. De /etc/xinetd.d/ map" id="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory"><div class="titlepage"><div><
 div keep-together.within-column="always"><h4 class="title">2.5.4.2. De /etc/xinetd.d/ map</h4></div></div></div><div class="para">
 				De <code class="filename">/etc/xinetd.d/</code> map bevat de configuratie bestanden voor elke service die beheerd wordt door <code class="systemitem">xinetd</code> en de namen van de bestanden komen overeen met die van de service. Zoals met <code class="filename">xinetd.conf</code>, wordt deze map gelezen als de <code class="systemitem">xinetd</code> service wordt opgestart. Om veranderingen effect te laten hebben, moet de beheerder de <code class="systemitem">xinetd</code> service opnieuw opstarten.
 			</div><div class="para">
 				Het formaat van de bestanden in de <code class="filename">/etc/xinetd.d/</code> map gebruikt dezelfde conventie als <code class="filename">/etc/xinetd.conf</code>. De belangrijkste reden dat de instelling voor elke service in een apart bestand wordt bewaard is om aanpassingen eenvoudiger te maken zonder effect te hebben op andere services.
diff --git a/public_html/nl-NL/Fedora/11/pdf/Security_Guide/Fedora-11-Security_Guide-nl-NL.pdf b/public_html/nl-NL/Fedora/11/pdf/Security_Guide/Fedora-11-Security_Guide-nl-NL.pdf
index 3bd94a9..6e27a52 100644
Binary files a/public_html/nl-NL/Fedora/11/pdf/Security_Guide/Fedora-11-Security_Guide-nl-NL.pdf and b/public_html/nl-NL/Fedora/11/pdf/Security_Guide/Fedora-11-Security_Guide-nl-NL.pdf differ
diff --git a/public_html/nl-NL/toc.html b/public_html/nl-NL/toc.html
index c68b68e..14a2c0d 100644
--- a/public_html/nl-NL/toc.html
+++ b/public_html/nl-NL/toc.html
@@ -501,7 +501,7 @@
 					</div>
 	        		
 					<div id='Fedora.11.Security_Guide' class="book collapsed" onclick="toggle(event, 'Fedora.11.Security_Guide.types');">
-						<a class="type" href="Fedora/11/html/Security_Guide/index.html" onclick="window.top.location='./Fedora/11/html/Security_Guide/index.html'"><span class="book">Security Guide</span></a> 
+						<a class="type" href="Fedora/11/html/Security_Guide/index.html" onclick="window.top.location='./Fedora/11/html/Security_Guide/index.html'"><span class="book">Beveiligings gids </span></a> 
 						<div id='Fedora.11.Security_Guide.types' class="types hidden" onclick="work=0;">
 						
 							<a class="type" href="./Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-nl-NL.epub" >epub</a>
diff --git a/public_html/toc.html b/public_html/toc.html
index fc4bddd..4a1f3dd 100644
--- a/public_html/toc.html
+++ b/public_html/toc.html
@@ -2662,7 +2662,7 @@
 						</div>
 	        			
 						<div class="book">
-							<span id="Security_Guide" class="book">Security Guide</span> 
+							<span id="Security_Guide" class="book">Guía de Seguridad</span> 
 							<div class="types">
 							
 								<a class="type" href="./es-ES/Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-es-ES.epub">epub</a>
@@ -5423,7 +5423,7 @@
 						</div>
 	        			
 						<div class="book">
-							<span id="Security_Guide" class="book">Security Guide</span> 
+							<span id="Security_Guide" class="book">Beveiligings gids </span> 
 							<div class="types">
 							
 								<a class="type" href="./nl-NL/Fedora/11/epub/Security_Guide/Fedora-11-Security_Guide-nl-NL.epub">epub</a>


More information about the docs-commits mailing list