neysx       05/06/01 17:42:46

  Modified:    xml/htdocs/doc/en/security shb-limits.xml shb-mounting.xml
                        shb-pam.xml shb-pre.xml shb-services.xml
  Log:
  Fixed cross-chapter links

Revision  Changes    Path
1.2       +2 -2      xml/htdocs/doc/en/security/shb-limits.xml

file : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-limits.xml?rev=1.2&content-type=text/x-cvsweb-markup&cvsroot=gentoo
plain: 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-limits.xml?rev=1.2&content-type=text/plain&cvsroot=gentoo
diff : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-limits.xml.diff?r1=1.1&r2=1.2&cvsroot=gentoo

Index: shb-limits.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-limits.xml,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- shb-limits.xml      1 Jun 2005 15:43:47 -0000       1.1
+++ shb-limits.xml      1 Jun 2005 17:42:46 -0000       1.2
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-limits.xml,v 
1.1 2005/06/01 15:43:47 neysx Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-limits.xml,v 
1.2 2005/06/01 17:42:46 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -70,7 +70,7 @@
 
 </body>
 </section>
-<section>
+<section id="quotas">
 <title>Quotas</title>
 <body>
 



1.2       +2 -2      xml/htdocs/doc/en/security/shb-mounting.xml

file : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-mounting.xml?rev=1.2&content-type=text/x-cvsweb-markup&cvsroot=gentoo
plain: 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-mounting.xml?rev=1.2&content-type=text/plain&cvsroot=gentoo
diff : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-mounting.xml.diff?r1=1.1&r2=1.2&cvsroot=gentoo

Index: shb-mounting.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-mounting.xml,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- shb-mounting.xml    1 Jun 2005 15:43:47 -0000       1.1
+++ shb-mounting.xml    1 Jun 2005 17:42:46 -0000       1.2
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-mounting.xml,v 1.1 
2005/06/01 15:43:47 neysx Exp $ -->
+<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-mounting.xml,v 1.2 
2005/06/01 17:42:46 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -57,7 +57,7 @@
 </warn>
 
 <note>
-For disk quotas see <uri link="#doc_chap6_sect3">the Quotas section</uri>.
+For disk quotas see <uri link="?part=1&amp;chap=5#quotas">the Quotas 
section</uri>.
 </note>
 
 <note>



1.2       +8 -8      xml/htdocs/doc/en/security/shb-pam.xml

file : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-pam.xml?rev=1.2&content-type=text/x-cvsweb-markup&cvsroot=gentoo
plain: 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-pam.xml?rev=1.2&content-type=text/plain&cvsroot=gentoo
diff : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-pam.xml.diff?r1=1.1&r2=1.2&cvsroot=gentoo

Index: shb-pam.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pam.xml,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- shb-pam.xml 1 Jun 2005 15:43:47 -0000       1.1
+++ shb-pam.xml 1 Jun 2005 17:42:46 -0000       1.2
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pam.xml,v 1.1 
2005/06/01 15:43:47 neysx Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pam.xml,v 1.2 
2005/06/01 17:42:46 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -55,13 +55,13 @@
 </pre>
 
 <p>
-Every service not configured with a PAM file in <path>/etc/pam.d</path> will 
use
-the rules in <path>/etc/pam.d/other</path>. The defaults are set to 
<c>deny</c>,
-as they should be. But I like to have a lot of logs, which is why I
-added <c>pam_warn.so</c>. The last configuration is <c>pam_limits</c>, which is
-controlled by <path>/etc/security/limits.conf</path>. See <uri link =
-"#limits_conf">/etc/security/limits.conf section</uri> for more on these
-settings.
+Every service not configured with a PAM file in <path>/etc/pam.d</path> will
+use the rules in <path>/etc/pam.d/other</path>. The defaults are set to
+<c>deny</c>, as they should be. But I like to have a lot of logs, which is why
+I added <c>pam_warn.so</c>. The last configuration is <c>pam_limits</c>, which
+is controlled by <path>/etc/security/limits.conf</path>. See the <uri
+link="?part=1&amp;chap=5#limits_conf">/etc/security/limits.conf</uri> section
+for more on these settings.
 </p>
 
 <pre caption="/etc/pam.d/other">



1.2       +16 -15    xml/htdocs/doc/en/security/shb-pre.xml

file : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-pre.xml?rev=1.2&content-type=text/x-cvsweb-markup&cvsroot=gentoo
plain: 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-pre.xml?rev=1.2&content-type=text/plain&cvsroot=gentoo
diff : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-pre.xml.diff?r1=1.1&r2=1.2&cvsroot=gentoo

Index: shb-pre.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pre.xml,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- shb-pre.xml 1 Jun 2005 15:43:47 -0000       1.1
+++ shb-pre.xml 1 Jun 2005 17:42:46 -0000       1.2
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pre.xml,v 1.1 
2005/06/01 15:43:47 neysx Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-pre.xml,v 1.2 
2005/06/01 17:42:46 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -15,20 +15,21 @@
 <body>
 
 <p>
-No matter how many safeguards you implement, they can all be easily 
circumvented
-by an attacker with physical access to your computer. Despite this, there are
-at least some measures that can be taken to provide a degree of security 
against
-an attacker with physical access to your machine. Putting your hardware in a
-locked closet prevents an attacker from simply unplugging it and carting it
-off. Locking your computer's case is also a good idea, to make sure that an
-attacker cannot simply walk away with your hard drive. To prevent an attacker
-from booting from another disk, nicely circumventing your permissions and login
-restrictions, try setting the hard drive as the first boot device in your BIOS,
-and setting a BIOS password. It is also important to set a LILO or GRUB boot
-password, to prevent a malicious user from booting into single-user mode and
-gaining complete access to your system. This is covered in more detail in
-Chapter 3, under <uri link="#passwording_GRUB">Setting a GRUB password</uri>
-and <uri link="#passwording_LILO">Setting a LILO password</uri>.
+No matter how many safeguards you implement, they can all be easily
+circumvented by an attacker with physical access to your computer. Despite
+this, there are at least some measures that can be taken to provide a degree of
+security against an attacker with physical access to your machine. Putting your
+hardware in a locked closet prevents an attacker from simply unplugging it and
+carting it off. Locking your computer's case is also a good idea, to make sure
+that an attacker cannot simply walk away with your hard drive. To prevent an
+attacker from booting from another disk, nicely circumventing your permissions
+and login restrictions, try setting the hard drive as the first boot device in
+your BIOS, and setting a BIOS password. It is also important to set a LILO or
+GRUB boot password, to prevent a malicious user from booting into single-user
+mode and gaining complete access to your system. This is covered in more detail
+in Chapter 3, under <uri link="?part=1&amp;chap=2#passwording_GRUB">Setting a
+GRUB password</uri> and <uri link="?part=1&amp;chap=2#passwording_LILO">Setting
+a LILO password</uri>.
 </p>
 
 </body>



1.2       +2 -2      xml/htdocs/doc/en/security/shb-services.xml

file : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-services.xml?rev=1.2&content-type=text/x-cvsweb-markup&cvsroot=gentoo
plain: 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-services.xml?rev=1.2&content-type=text/plain&cvsroot=gentoo
diff : 
http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/security/shb-services.xml.diff?r1=1.1&r2=1.2&cvsroot=gentoo

Index: shb-services.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-services.xml,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- shb-services.xml    1 Jun 2005 15:43:47 -0000       1.1
+++ shb-services.xml    1 Jun 2005 17:42:46 -0000       1.2
@@ -1,5 +1,5 @@
 <?xml version='1.0' encoding='UTF-8'?>
-<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-services.xml,v 1.1 
2005/06/01 15:43:47 neysx Exp $ -->
+<!-- $Header: 
/var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-services.xml,v 1.2 
2005/06/01 17:42:46 neysx Exp $ -->
 <!DOCTYPE sections SYSTEM "/dtd/book.dtd">
 
 <!-- The content of this document is licensed under the CC-BY-SA license -->
@@ -444,7 +444,7 @@
 <p>
 Now your users should guard this private key well. Put it on a media that they
 always carry with them or keep it on their workstation (put this in the <uri
-link="#security_policies">password</uri> policy).
+link="?part=1&amp;chap=1#security_policies">password</uri> policy).
 </p>
 
 <p>



-- 
[email protected] mailing list

Reply via email to