- Reorder index entries:

anonymous CVS -> CVS, anonymous
  web browsers  -> browsers, web
- PAE got sorted into the symbol section;
  remove line feed after <primary> tag.
- Unify the entries "TCP Wrappers", "web servers".
- Add entries.
This commit is contained in:
Martin Heinen 2005-01-12 23:56:25 +00:00
parent 5d01277667
commit d34acab93a
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=23540
8 changed files with 54 additions and 20 deletions

View file

@ -486,7 +486,11 @@
to kernel panics or data corruption.</para>
</warning>
<indexterm><primary>anonymous CVS</primary></indexterm>
<indexterm>
<primary>CVS</primary>
<secondary>anonymous</secondary>
</indexterm>
<para><application>Anonymous CVS</application> and
<application>CVSup</application> use the <emphasis>pull</emphasis>
model of updating sources. In the case of

View file

@ -101,6 +101,11 @@
<sect1 id="desktop-browsers">
<title>Browsers</title>
<indexterm>
<primary>browsers</primary>
<secondary>web</secondary>
</indexterm>
<para>FreeBSD does not come with a particular browser
pre-installed. Instead, the
<ulink url="http://www.FreeBSD.org/ports/www.html">www</ulink>

View file

@ -2763,6 +2763,11 @@ use the current settings.
<sect2 id="ftpanon">
<title>Anonymous FTP</title>
<indexterm>
<primary>FTP</primary>
<secondary>anonymous</secondary>
</indexterm>
<screen> User Confirmation Requested
Do you want to have anonymous FTP access to this machine?
@ -3464,6 +3469,11 @@ To change any of these settings later, edit /etc/rc.conf
<filename>/etc/amd.map</filename> file defines the default
options for <acronym>AMD</acronym> exports.</para>
<indexterm>
<primary>FTP</primary>
<secondary>anonymous</secondary>
</indexterm>
<para>The <guimenuitem>Anon FTP</guimenuitem> option permits anonymous
<acronym>FTP</acronym> connections. Select this option to
make this machine an anonymous <acronym>FTP</acronym> server.

View file

@ -295,7 +295,6 @@
<indexterm>
<primary><command>cvsup</command></primary>
</indexterm>
<indexterm><primary>anonymous CVS</primary></indexterm>
<indexterm><primary>CTM</primary></indexterm>
<indexterm>
<primary>CVS</primary>
@ -1422,12 +1421,9 @@ device fwe # Ethernet over FireWire (non-standard!)</programl
<sect2>
<title>Large Memory Configurations (<acronym>PAE</acronym>)</title>
<indexterm>
<primary>
Physical Address Extensions (<acronym>PAE</acronym>)
</primary>
<secondary>
Large Memory Configurations
</secondary>
<primary>Physical Address Extensions
(<acronym>PAE</acronym>)</primary>
<secondary>large memory</secondary>
</indexterm>
<para>Large memory configuration machines require access to

View file

@ -302,6 +302,11 @@
<sect2>
<title><anchor id="anoncvs-intro">Introduction</title>
<indexterm>
<primary>CVS</primary>
<secondary>anonymous</secondary>
</indexterm>
<para>Anonymous CVS (or, as it is otherwise known,
<emphasis>anoncvs</emphasis>) is a feature provided by the CVS
utilities bundled with FreeBSD for synchronizing with a remote
@ -535,6 +540,10 @@ Warning: Permanently added 'anoncvs.freebsd.org' (DSA) to the list of known host
<sect1 id="ctm">
<title>Using CTM</title>
<indexterm>
<primary>CTM</primary>
</indexterm>
<para><application>CTM</application> is a method for keeping a
remote directory tree in sync with a central one. It has been
developed for usage with FreeBSD's source trees, though other

View file

@ -1858,9 +1858,9 @@ nis_client_enable="YES"</programlisting>
host.</para>
<para>The <command>ypserv</command> program also has support for
Wietse Venema's <application>tcpwrapper</application> package.
Wietse Venema's <application>TCP Wrapper</application> package.
This allows the administrator to use the
<application>tcpwrapper</application> configuration files for
<application>TCP Wrapper</application> configuration files for
access control instead of
<filename>/var/yp/securenets</filename>.</para>
@ -1885,8 +1885,8 @@ nis_client_enable="YES"</programlisting>
really bad idea and will lead to loss of NIS functionality
for large parts of your network.</para>
<indexterm><primary>tcpwrapper</primary></indexterm>
<para>The use of the <application>tcpwrapper</application>
<indexterm><primary>TCP Wrappers</primary></indexterm>
<para>The use of the <application>TCP Wrapper</application>
package increases the latency of your NIS server. The
additional delay may be long enough to cause timeouts in
client programs, especially in busy networks or with slow
@ -4211,7 +4211,7 @@ zone "0.168.192.in-addr.arpa" {
</sect1info>
<title>Apache HTTP Server</title>
<indexterm><primary>web server</primary>
<indexterm><primary>web servers</primary>
<secondary>setting up</secondary></indexterm>
<indexterm><primary>Apache</primary></indexterm>
@ -4431,7 +4431,7 @@ DocumentRoot /www/someotherdomain.tld
<sect3>
<title>mod_ssl</title>
<indexterm><primary>web server</primary>
<indexterm><primary>web servers</primary>
<secondary>secure</secondary></indexterm>
<indexterm><primary>SSL</primary></indexterm>
<indexterm><primary>cryptography</primary></indexterm>
@ -4543,6 +4543,11 @@ DocumentRoot /www/someotherdomain.tld
restrictions. The &man.ftpchroot.5; manual page has all of
the details so it will not be described in detail here.</para>
<indexterm>
<primary>FTP</primary>
<secondary>anonymous</secondary>
</indexterm>
<para>If you would like to enable anonymous FTP access to your
server, then you must create a user named
<username>ftp</username> on your &os; system. Users will then
@ -4598,6 +4603,11 @@ DocumentRoot /www/someotherdomain.tld
<programlisting>ftp.info /var/log/xferlog</programlisting>
<indexterm>
<primary>FTP</primary>
<secondary>anonymous</secondary>
</indexterm>
<para>Be aware of the potential problems involved with running
an anonymous FTP server. In particular, you should think
twice about allowing anonymous users to upload files. You may

View file

@ -819,10 +819,10 @@
otherwise.</para>
<para>You should also be fairly careful with connect-back services
such as <application>tcpwrapper</application>'s reverse-identd,
such as <application>TCP Wrapper</application>'s reverse-identd,
which can be attacked directly. You generally do not want to use
the reverse-ident feature of
<application>tcpwrappers</application> for this reason.</para>
<application>TCP Wrapper</application> for this reason.</para>
<para>It is a very good idea to protect internal services from
external access by firewalling them off at your border routers.

View file

@ -1041,10 +1041,10 @@ EndSection</programlisting>
<literal>vrgb</literal> or <literal>vbgr</literal>: experiment and
see which works best.</para></note>
<indexterm><primary>Mozilla</primary></indexterm>
<indexterm><primary>web browsers</primary>
<secondary>Mozilla</secondary>
<see>Mozilla</see></indexterm>
<indexterm>
<primary>Mozilla</primary>
<secondary>disabling anti-aliased fonts</secondary>
</indexterm>
<para>Anti-aliasing should be enabled the next time the X
server is started. However, programs must know how to take