jimw            Tue Nov 20 20:48:54 2001 EDT

  Modified files:              
    /phpdoc/de/chapters security.xml 
    /phpdoc/de/functions        var.xml 
    /phpdoc/en/chapters security.xml 
    /phpdoc/en/functions        var.xml 
    /phpdoc/es/chapters security.xml 
    /phpdoc/es/functions        var.xml 
    /phpdoc/fr/chapters security.xml 
    /phpdoc/fr/functions        var.xml 
    /phpdoc/hk/chapters security.xml 
    /phpdoc/hu/chapters security.xml 
    /phpdoc/hu/functions        var.xml 
    /phpdoc/it/functions        var.xml 
    /phpdoc/ja/chapters security.xml 
    /phpdoc/ja/functions        var.xml 
    /phpdoc/kr/chapters security.xml 
    /phpdoc/kr/functions        var.xml 
    /phpdoc/nl/chapters security.xml 
  Log:
  change a couple of 'id' values that produce pages that some mirrors get tripped up 
on.
  
Index: phpdoc/de/chapters/security.xml
diff -u phpdoc/de/chapters/security.xml:1.11 phpdoc/de/chapters/security.xml:1.12
--- phpdoc/de/chapters/security.xml:1.11        Sat Nov 10 16:49:22 2001
+++ phpdoc/de/chapters/security.xml     Tue Nov 20 20:48:32 2001
@@ -94,10 +94,10 @@
    </simpara>
   </sect1>
 
-  <sect1 id="security.cgi">
+  <sect1 id="security.cgi-bin">
    <title>CGI-Version</title>
 
-  <sect2 id="security.cgi.attacks">
+  <sect2 id="security.cgi-bin.attacks">
    <title>Mgliche Angriffe</title>
    <simpara>
     PHP als <acronym>CGI</acronym> zu nutzen, ist eine Mglichkeit
@@ -174,7 +174,7 @@
     </itemizedlist>
    </sect2>
 
-   <sect2 id="security.cgi.default">
+   <sect2 id="security.cgi-bin.default">
     <title>Fall 1: Nur ffentliche Dateien vorhanden</title>
     <simpara>
      Wenn der Server keine Inhalte hat, die durch Passwort oder
@@ -196,7 +196,7 @@
     </simpara>
    </sect2>
 
-   <sect2 id="security.cgi.force-redirect">
+   <sect2 id="security.cgi-bin.force-redirect">
     <title>Fall 2: --enable-force-cgi-redirect benutzen</title>
     <simpara>
      Diese beim Kompilieren verwendete Option verhindert grundstzlich 
@@ -225,7 +225,7 @@
     </simpara>
    </sect2>
 
-   <sect2 id="security.cgi.doc-root">
+   <sect2 id="security.cgi-bin.doc-root">
     <title>Fall 3: doc_root oder user_dir festlegen</title>
     <simpara>
      Aktiven Inhalt, wie beispielsweise Skripts und ausfhrbare
@@ -287,7 +287,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.shell">
+   <sect2 id="security.cgi-bin.shell">
     <title>Fall 4: PHP-Parser auerhalb des Webverzeichnisbaums</title>
     <para>
      Eine sehr sichere Sache ist es, das PHP-Parser-Binary irgendwo
Index: phpdoc/de/functions/var.xml
diff -u phpdoc/de/functions/var.xml:1.29 phpdoc/de/functions/var.xml:1.30
--- phpdoc/de/functions/var.xml:1.29    Wed Nov 14 17:07:54 2001
+++ phpdoc/de/functions/var.xml Tue Nov 20 20:48:32 2001
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
- <reference id="ref.var">
+ <reference id="ref.variables">
   <title>Variablen-Funktionen</title>
   <titleabbrev>Variablen</titleabbrev>
 
Index: phpdoc/en/chapters/security.xml
diff -u phpdoc/en/chapters/security.xml:1.34 phpdoc/en/chapters/security.xml:1.35
--- phpdoc/en/chapters/security.xml:1.34        Tue Nov 13 19:20:50 2001
+++ phpdoc/en/chapters/security.xml     Tue Nov 20 20:48:33 2001
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.34 $ -->
+<!-- $Revision: 1.35 $ -->
  <chapter id="security">
   <title>Security</title>
 
@@ -86,10 +86,10 @@
    </simpara>
   </sect1>
 
-  <sect1 id="security.cgi">
+  <sect1 id="security.cgi-bin">
    <title>Installed as CGI binary</title>
 
-   <sect2 id="security.cgi.attacks">
+   <sect2 id="security.cgi-bin.attacks">
     <title>Possible attacks</title>
     <simpara>
      Using PHP as a <acronym>CGI</acronym> binary is an option for
@@ -161,7 +161,7 @@
     </itemizedlist>
    </sect2>
 
-   <sect2 id="security.cgi.default">
+   <sect2 id="security.cgi-bin.default">
     <title>Case 1: only public files served</title>
 
     <simpara>
@@ -185,7 +185,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.force-redirect">
+   <sect2 id="security.cgi-bin.force-redirect">
     <title>Case 2: using --enable-force-cgi-redirect</title>
     <simpara>
      This compile-time option prevents anyone from calling PHP
@@ -213,7 +213,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.doc-root">
+   <sect2 id="security.cgi-bin.doc-root">
     <title>Case 3: setting doc_root or user_dir</title>
     <simpara>
      To include active content, like scripts and executables, in the
@@ -273,7 +273,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.shell">
+   <sect2 id="security.cgi-bin.shell">
     <title>Case 4: PHP parser outside of web tree</title>
     <para>
      A very secure option is to put the PHP parser binary somewhere
Index: phpdoc/en/functions/var.xml
diff -u phpdoc/en/functions/var.xml:1.75 phpdoc/en/functions/var.xml:1.76
--- phpdoc/en/functions/var.xml:1.75    Sun Nov 11 06:28:56 2001
+++ phpdoc/en/functions/var.xml Tue Nov 20 20:48:33 2001
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.75 $ -->
- <reference id="ref.var">
+<!-- $Revision: 1.76 $ -->
+ <reference id="ref.variables">
   <title>Variable Functions</title>
   <titleabbrev>Variables</titleabbrev>
 
Index: phpdoc/es/chapters/security.xml
diff -u phpdoc/es/chapters/security.xml:1.4 phpdoc/es/chapters/security.xml:1.5
--- phpdoc/es/chapters/security.xml:1.4 Wed Nov 14 17:27:03 2001
+++ phpdoc/es/chapters/security.xml     Tue Nov 20 20:48:33 2001
@@ -24,10 +24,10 @@
    de configuraci&oacute;n y las situaciones donde pueden ser usadas de manera segura.
   </simpara>
 
-  <sect1 id="security.cgi">
+  <sect1 id="security.cgi-bin">
    <title>Binarios CGI</title>
 
-   <sect2 id="security.cgi.attacks">
+   <sect2 id="security.cgi-bin.attacks">
     <title>Posibles ataques</title>
     <simpara>
      Usando PHP como un binario <acronym>CGI</acronym> es una opci&oacute;n para 
@@ -99,7 +99,7 @@
     </itemizedlist>
    </sect2>
 
-   <sect2 id="security.cgi.default">
+   <sect2 id="security.cgi-bin.default">
     <title>Caso 1: solamente se sirven ficheros publicos</title>
 
     <simpara>
@@ -123,7 +123,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.force-redirect">
+   <sect2 id="security.cgi-bin.force-redirect">
     <title>Caso 2: usando --enable-force-cgi-redirect</title>
     <simpara>
      Esta opcion a la hora de compilar previene que alguien llame
@@ -150,7 +150,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.doc-root">
+   <sect2 id="security.cgi-bin.doc-root">
     <title>Caso 3: Usando doc_root or user_dir</title>
     <simpara>
      Incluir contenidos activos, como script y ejecutables, en
@@ -210,7 +210,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.shell">
+   <sect2 id="security.cgi-bin.shell">
     <title>Caso 4: Analizador PHP fuera del arbol web.</title>
     <para>
      Una opcion muy segura es poner el analizador binario PHP, en algun lugar
Index: phpdoc/es/functions/var.xml
diff -u phpdoc/es/functions/var.xml:1.5 phpdoc/es/functions/var.xml:1.6
--- phpdoc/es/functions/var.xml:1.5     Wed Nov 14 17:27:06 2001
+++ phpdoc/es/functions/var.xml Tue Nov 20 20:48:34 2001
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<reference id="ref.var">
+<reference id="ref.variables">
   <title>Funciones sobre variables</title>
   <titleabbrev>Variables</titleabbrev>
 
Index: phpdoc/fr/chapters/security.xml
diff -u phpdoc/fr/chapters/security.xml:1.17 phpdoc/fr/chapters/security.xml:1.18
--- phpdoc/fr/chapters/security.xml:1.17        Mon Nov 12 00:03:38 2001
+++ phpdoc/fr/chapters/security.xml     Tue Nov 20 20:48:34 2001
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.17 $ -->
+<!-- $Revision: 1.18 $ -->
  <chapter id="security">
   <title>S&eacute;curit&eacute;</title>
   <simpara>
@@ -92,9 +92,9 @@
     de victimes : ne soyez pas la prochaine.
    </simpara>
   </sect1>
-  <sect1 id="security.cgi">
+  <sect1 id="security.cgi-bin">
    <title>Binaires CGI</title>
-   <sect2 id="security.cgi.attacks">
+   <sect2 id="security.cgi-bin.attacks">
     <title>Faiblesses connues</title>
     <simpara>
          Utiliser le PHP comme un <acronym>CGI</acronym> ex&eacute;cutable vient
@@ -170,7 +170,7 @@
      </listitem>
     </itemizedlist>
    </sect2>
-   <sect2 id="security.cgi.default">
+   <sect2 id="security.cgi-bin.default">
     <title>Cas 1: Tous les fichiers sont publics</title>
     <simpara>
       Si votre serveur n'a aucun document dont l'acc&egrave;s est restreint
@@ -192,7 +192,7 @@
       "Action" (voir ci-dessous).
     </simpara>
    </sect2>
-   <sect2 id="security.cgi.force-redirect">
+   <sect2 id="security.cgi-bin.force-redirect">
     <title>
       Cas 2: Utilisation de la directive de compilation
       <link 
linkend="install.configure.enable-force-cgi-redirect">--enable-force-cgi-redirect</link>
@@ -222,7 +222,7 @@
       d'exploitation de la version binaire CGI du PHP, comme expos&eacute; ci-dessous.
     </simpara>
    </sect2>
-   <sect2 id="security.cgi.doc-root">
+   <sect2 id="security.cgi-bin.doc-root">
     <title>Cas 3: Utilisation du "doc_root" ou du "user_dir"</title>
     <simpara>
       Ajouter un contenu interactif dans votre serveur web, comme des scripts
@@ -287,7 +287,7 @@
       s&eacute;par&eacute;ment des r&eacute;pertoires "user directory".
     </simpara>
    </sect2>
-   <sect2 id="security.cgi.shell">
+   <sect2 id="security.cgi-bin.shell">
     <title>
      Cas 4: L'ex&eacute;cutable PHP &agrave; l'ext&eacute;rieur de l'arborescence du 
serveur
     </title>
Index: phpdoc/fr/functions/var.xml
diff -u phpdoc/fr/functions/var.xml:1.16 phpdoc/fr/functions/var.xml:1.17
--- phpdoc/fr/functions/var.xml:1.16    Wed Nov 14 17:22:39 2001
+++ phpdoc/fr/functions/var.xml Tue Nov 20 20:48:35 2001
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
- <reference id="ref.var">
+ <reference id="ref.variables">
   <title>Variables</title>
   <titleabbrev>Fonctions sur les variables</titleabbrev>
   <refentry id="function.doubleval">
Index: phpdoc/hk/chapters/security.xml
diff -u phpdoc/hk/chapters/security.xml:1.2 phpdoc/hk/chapters/security.xml:1.3
--- phpdoc/hk/chapters/security.xml:1.2 Wed Nov 14 18:16:35 2001
+++ phpdoc/hk/chapters/security.xml     Tue Nov 20 20:48:35 2001
@@ -37,10 +37,10 @@
    levels of security, and ends with some general security advice.
   </simpara>
 
-  <sect1 id="security.cgi">
+  <sect1 id="security.cgi-bin">
    <title>Installed as CGI binary</title>
 
-   <sect2 id="security.cgi.attacks">
+   <sect2 id="security.cgi-bin.attacks">
     <title>Possible attacks</title>
     <simpara>
      Using PHP as a <acronym>CGI</acronym> binary is an option for
@@ -112,7 +112,7 @@
     </itemizedlist>
    </sect2>
 
-   <sect2 id="security.cgi.default">
+   <sect2 id="security.cgi-bin.default">
     <title>Case 1: only public files served</title>
 
     <simpara>
@@ -136,7 +136,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.force-redirect">
+   <sect2 id="security.cgi-bin.force-redirect">
     <title>Case 2: using --enable-force-cgi-redirect</title>
     <simpara>
      This compile-time option prevents anyone from calling PHP
@@ -164,7 +164,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.doc-root">
+   <sect2 id="security.cgi-bin.doc-root">
     <title>Case 3: setting doc_root or user_dir</title>
     <simpara>
      To include active content, like scripts and executables, in the
@@ -224,7 +224,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.shell">
+   <sect2 id="security.cgi-bin.shell">
     <title>Case 4: PHP parser outside of web tree</title>
     <para>
      A very secure option is to put the PHP parser binary somewhere
Index: phpdoc/hu/chapters/security.xml
diff -u phpdoc/hu/chapters/security.xml:1.12 phpdoc/hu/chapters/security.xml:1.13
--- phpdoc/hu/chapters/security.xml:1.12        Sat Nov 10 16:49:55 2001
+++ phpdoc/hu/chapters/security.xml     Tue Nov 20 20:48:35 2001
@@ -42,10 +42,10 @@
    rdekesek lehetnek. Vgl nhny ltalnos tancs kvetkezik.
   </simpara>
 
-  <sect1 id="security.cgi">
+  <sect1 id="security.cgi-bin">
    <title>CGI futtathat llomnyknt teleptett PHP</title>
 
-   <sect2 id="security.cgi.attacks">
+   <sect2 id="security.cgi-bin.attacks">
     <title>Lehetsges tmadsok</title>
     <simpara>
      A PHP <acronym>CGI</acronym> futtathat llomnyknt val hasznlata
@@ -117,7 +117,7 @@
     </itemizedlist>
    </sect2>
 
-   <sect2 id="security.cgi.default">
+   <sect2 id="security.cgi-bin.default">
     <title>1. eset : csak publikus fjlok</title>
 
     <simpara>
@@ -140,7 +140,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.force-redirect">
+   <sect2 id="security.cgi-bin.force-redirect">
     <title>2. eset : az --enable-force-cgi-redirect hasznlata</title>
     <simpara>
      Ez a fordtsi paramter megakadlyozza, hogy brki meghvja a
@@ -169,7 +169,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.doc-root">
+   <sect2 id="security.cgi-bin.doc-root">
     <title>3. eset : a doc_root vagy user_dir belltsa</title>
     <simpara>
      Aktv tartalom elhelyezse a norml dokumentumok kztt,
@@ -229,7 +229,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.shell">
+   <sect2 id="security.cgi-bin.shell">
     <title>4. eset : PHP feldolgoz a web knyvtrfn kvl</title>
     <para>
      Egy rendkvl biztonsgos lehetsg, ha a PHP feldolgozt valahol a
Index: phpdoc/hu/functions/var.xml
diff -u phpdoc/hu/functions/var.xml:1.6 phpdoc/hu/functions/var.xml:1.7
--- phpdoc/hu/functions/var.xml:1.6     Sat Nov 10 16:49:57 2001
+++ phpdoc/hu/functions/var.xml Tue Nov 20 20:48:36 2001
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="iso-8859-2"?>
 <!-- EN-Revision: n/a Maintainer: goba Status: ready -->
 
- <reference id="ref.var">
+ <reference id="ref.variables">
   <title>Vltozkkal kapcsolatos fggvnyek</title>
   <titleabbrev>Vltozk</titleabbrev>
 
Index: phpdoc/it/functions/var.xml
diff -u phpdoc/it/functions/var.xml:1.12 phpdoc/it/functions/var.xml:1.13
--- phpdoc/it/functions/var.xml:1.12    Sat Nov 10 16:50:04 2001
+++ phpdoc/it/functions/var.xml Tue Nov 20 20:48:36 2001
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
 <!-- EN-Revision: 1.23 Maintainer: marchesini Status: ready -->
-<reference id="ref.var">
+<reference id="ref.variables">
   <title>Funzioni di Variabili</title>
   <titleabbrev>Variabili</titleabbrev>
 
Index: phpdoc/ja/chapters/security.xml
diff -u phpdoc/ja/chapters/security.xml:1.14 phpdoc/ja/chapters/security.xml:1.15
--- phpdoc/ja/chapters/security.xml:1.14        Wed Nov 14 17:55:18 2001
+++ phpdoc/ja/chapters/security.xml     Tue Nov 20 20:48:37 2001
@@ -36,10 +36,10 @@
    ティ上のアドバイスを行います。
   </simpara>
 
-  <sect1 id="security.cgi">
+  <sect1 id="security.cgi-bin">
    <title>CGI バイナリとしてインストール</title>
    
-   <sect2 id="security.cgi.attacks">
+   <sect2 id="security.cgi-bin.attacks">
     <title>有りうる攻撃</title>
 
     <simpara>
@@ -112,7 +112,7 @@
     </itemizedlist>
    </sect2>
 
-   <sect2 id="security.cgi.default">
+   <sect2 id="security.cgi-bin.default">
     <title>ケース 1: 公開ファイルのみを配布</title>
     <simpara>
      サーバー上にパスワードまたは IP 
アドレスを元にしたアクセス制限に
@@ -136,7 +136,7 @@
     </simpara>
    </sect2>
    
-   <sect2 id="security.cgi.force-redirect">
+   <sect2 id="security.cgi-bin.force-redirect">
     <title>ケース 2: --enable-force-cgi-redirect を使用</title>
     <simpara>
      このコンパイル時のオプションは、
@@ -164,7 +164,7 @@
     </simpara>
    </sect2>
    
-   <sect2 id="security.cgi.doc-root">
+   <sect2 id="security.cgi-bin.doc-root">
     <title>ケース 3: doc_root または user_dir を設定</title>
     <simpara>
      Web サーバー上のドキュメントディレクトリに
@@ -231,7 +231,7 @@
     </simpara>
    </sect2>
    
-   <sect2 id="security.cgi.shell">
+   <sect2 id="security.cgi-bin.shell">
     <title>ケース 4: web ツリーの外に PHP パーサを置く</title>
     <para>
      非常に安全性の高いオプションとしてPHP 
パーサのバイナリをファイル
Index: phpdoc/ja/functions/var.xml
diff -u phpdoc/ja/functions/var.xml:1.31 phpdoc/ja/functions/var.xml:1.32
--- phpdoc/ja/functions/var.xml:1.31    Wed Nov 14 17:55:24 2001
+++ phpdoc/ja/functions/var.xml Tue Nov 20 20:48:43 2001
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="utf-8"?>
-<reference id="ref.var">
+<reference id="ref.variables">
   <title>変数用の関数</title>
   <titleabbrev>変数</titleabbrev>
 
Index: phpdoc/kr/chapters/security.xml
diff -u phpdoc/kr/chapters/security.xml:1.3 phpdoc/kr/chapters/security.xml:1.4
--- phpdoc/kr/chapters/security.xml:1.3 Wed Nov 14 18:14:07 2001
+++ phpdoc/kr/chapters/security.xml     Tue Nov 20 20:48:46 2001
@@ -24,9 +24,9 @@
    이 장은 PHP를 안전하게 사용할수 있는 여러 다른 설정 옵션의 
조합과 상황을 설명하는 것으로 시작한다.
    그리고, 각각 상이한 보안 레벨에서의 코딩에 있어서 
여러가지 고려사항을 설명한다.
   </simpara>
-       <sect1 id="security.cgi">
+       <sect1 id="security.cgi-bin">
                <title>Installed as CGI binary</title>
-               <sect2 id="security.cgi.attacks">
+               <sect2 id="security.cgi-bin.attacks">
                        <title>가능한 공격 (Possible attacks)</title>
                        <simpara>
      <acronym>CGI</acronym> binary 형태의 PHP는 어떤 이유로 (아파치 
같은) 서버 소프트웨어의 모듈로 
@@ -74,7 +74,7 @@
                                </listitem>
                        </itemizedlist>
                </sect2>
-               <sect2 id="security.cgi.default">
+               <sect2 id="security.cgi-bin.default">
                        <title>Case 1: 공용 파일만 제공하는 경우 (only 
public files served)</title>
                        <simpara>
        만약 여러분의 서버가 password 나 ip 기준의 접근 통제에 
관한 어떠한 사항도 없다면, 
@@ -90,7 +90,7 @@
        리디렉션은 예를들어 Apache에서는 AddHandle과 Action 지시자를 
사용하여 설정할 수 있습니다. (아래를 보세요.)
     </simpara>
                </sect2>
-               <sect2 id="security.cgi.force-redirect">
+               <sect2 id="security.cgi-bin.force-redirect">
                        <title>Case 2: --enable-force-cgi-redirect 옵션 
사용</title>
                        <simpara>
        이 옵션을 주고 PHP를 컴파일 하면, 사용자가 <filename 
role="php">http://my.host/cgi-bin/php/secretdir/script.php</filename>와 
@@ -111,7 +111,7 @@
        여러분은 이 옵션을 사용할 수 없으므로 이 문서에 있는 CGI 
버전에 대한 다른 방법을 사용해야 할 것이다. 
     </simpara>
                </sect2>
-               <sect2 id="security.cgi.doc-root">
+               <sect2 id="security.cgi-bin.doc-root">
                        <title>Case 3: doc_root나 user_dir의 설정</title>
                        <simpara>
        웹서버 문서 디렉토리에 script나 실행파일 같은 Active 
content를 포함하는 것은 때때로 불안한 상황을 만들 수 있다. 
@@ -149,7 +149,7 @@
        여러분은 document root와 user directory 접근 통제를 따로따로 할 
수 있다.
     </simpara>
                </sect2>
-               <sect2 id="security.cgi.shell">
+               <sect2 id="security.cgi-bin.shell">
                        <title>Case 4: PHP parser를 웹 트리 밖에 두기 (parser 
outside of web tree)</title>
                        <para>
        매우 신뢰할수 있는 방법으로 PHP parser binary를 웹 트리 
밖에다 두는 방법이다. 
Index: phpdoc/kr/functions/var.xml
diff -u phpdoc/kr/functions/var.xml:1.5 phpdoc/kr/functions/var.xml:1.6
--- phpdoc/kr/functions/var.xml:1.5     Wed Nov 14 18:14:11 2001
+++ phpdoc/kr/functions/var.xml Tue Nov 20 20:48:48 2001
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="utf-8"?>
- <reference id="ref.var">
+ <reference id="ref.variables">
   <title>Variable Functions</title>
   <titleabbrev>Variables</titleabbrev>
 
Index: phpdoc/nl/chapters/security.xml
diff -u phpdoc/nl/chapters/security.xml:1.10 phpdoc/nl/chapters/security.xml:1.11
--- phpdoc/nl/chapters/security.xml:1.10        Wed Nov 14 17:36:37 2001
+++ phpdoc/nl/chapters/security.xml     Tue Nov 20 20:48:50 2001
@@ -38,10 +38,10 @@
    advies.
   </simpara>
 
-  <sect1 id="security.cgi">
+  <sect1 id="security.cgi-bin">
    <title>Ge&iuml;nstalleerd als CGI binary</title>
 
-   <sect2 id="security.cgi.attacks">
+   <sect2 id="security.cgi-bin.attacks">
     <title>Mogelijke aanvallen</title>
     <simpara>
      PHP gebruiken als <acronym>CGI</acronym> binary is een optie voor
@@ -116,7 +116,7 @@
     </itemizedlist>
    </sect2>
 
-   <sect2 id="security.cgi.default">
+   <sect2 id="security.cgi-bin.default">
     <title>Case 1: alleen normale bestanden</title>
 
     <simpara>
@@ -140,7 +140,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.force-redirect">
+   <sect2 id="security.cgi-bin.force-redirect">
     <title>Case 2: gebruik maken van --enable-force-cgi-redirect</title>
     <simpara>
      Deze compile-time optie voorkomt het direct aanroepen van PHP
@@ -168,7 +168,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.doc-root">
+   <sect2 id="security.cgi-bin.doc-root">
     <title>Case 3: het gebruik van doc_root of user_dir</title>
     <simpara>
      Soms wordt in twijfel getrokken of het gebruiken van scrips of
@@ -228,7 +228,7 @@
     </simpara>
    </sect2>
       
-   <sect2 id="security.cgi.shell">
+   <sect2 id="security.cgi-bin.shell">
     <title>Case 4: PHP parser buiten de of web tree</title>
     <para>
      Een erg veilige optie is het plaatsen van de PHP binary buiten de


Reply via email to