web/html/docs/security-guide/f10/en_US/Common_Content/css common.css, 1.1, 1.2
Eric Christensen
sparks at fedoraproject.org
Fri Jan 16 23:15:40 UTC 2009
- Previous message (by thread): web/html/docs/security-guide/f10/en_US/Common_Content/images watermark-draft.png, NONE, 1.1 title_logo.png, 1.1, 1.2
- Next message (by thread): web/html/docs/security-guide/f10/en_US sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html, NONE, 1.1 sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html, NONE, 1.1 sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html, NONE, 1.1 sect-Security_Guide-Encryption-Using_GPG.html, NONE, 1.1 Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html, 1.2, 1.3 Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html, 1.2, 1.3 Security_Guide-Encryption-Data_in_Motion.html, 1.2, 1.3 Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html, 1.2, 1.3 We_Need_Feedback.html, 1.2, 1.3 chap-Security_Guide-Encryption.html, 1.2, 1.3 chap-Security_Guide-General_Principles_of_Information_Security.html, 1.2, 1.3 chap-Security_Guide-References.html, 1.2, 1.3 chap-Security_Guide-Secure_Installation.html, 1.2, 1.3 chap-Security_Guide-Securing_Your_Network.html, 1.2, 1.3 chap-Security_Guide-Security_Overview.html, 1.2, 1.3 chap-Security_Guide-Software_Maintenance.html, 1.2, 1.3 index.html, 1.2, 1.3 pref-Security_Guide-Preface.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Related_Books.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Related_Documentation.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html, 1.2, 1.3 sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html, 1.2, 1.3 sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html, 1.2, 1.3 sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html, 1.2, 1.3 sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html, 1.2, 1.3 sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html, 1.2, 1.3 sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html, 1.2, 1.3 sect-Security_Guide-Attackers_and_Vulnerabilities.html, 1.2, 1.3 sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html, 1.2, 1.3 sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html, 1.2, 1.3 sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html, 1.2, 1.3 sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html, 1.2, 1.3 sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html, 1.2, 1.3 sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html, 1.2, 1.3 sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html, 1.2, 1.3 sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html, 1.2, 1.3 sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html, 1.2, 1.3 sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html, 1.2, 1.3 sect-Security_Guide-Common_Exploits_and_Attacks.html, 1.2, 1.3 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html, 1.2, 1.3 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html, 1.2, 1.3 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html, 1.2, 1.3 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html, 1.2, 1.3 sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html, 1.2, 1.3 sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html, 1.2, 1.3 sect-Security_Guide-Evaluating_the_Tools-Nessus.html, 1.2, 1.3 sect-Security_Guide-Evaluating_the_Tools-Nikto.html, 1.2, 1.3 sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html, 1.2, 1.3 sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html, 1.2, 1.3 sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html, 1.2, 1.3 sect-Security_Guide-Firewalls-Additional_Resources.html, 1.2, 1.3 sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html, 1.2, 1.3 sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html, 1.2, 1.3 sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html, 1.2, 1.3 sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html, 1.2, 1.3 sect-Security_Guide-Firewalls-IPv6.html, 1.2, 1.3 sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html, 1.2, 1.3 sect-Security_Guide-Firewalls-Using_IPTables.html, 1.2, 1.3 sect-Security_Guide-Firewalls.html, 1.2, 1.3 sect-Security_Guide-IPTables-Additional_Resources.html, 1.2, 1.3 sect-Security_Guide-IPTables-Command_Options_for_IPTables.html, 1.2, 1.3 sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html, 1.2, 1.3 sect-Security_Guide-IPTables-IPTables_Control_Scripts.html, 1.2, 1.3 sect-Security_Guide-IPTables-IPTables_and_IPv6.html, 1.2, 1.3 sect-Security_Guide-IPTables-Saving_IPTables_Rules.html, 1.2, 1.3 sect-Security_Guide-IPTables.html, 1.2, 1.3 sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html, 1.2, 1.3 sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html, 1.2, 1.3 sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html, 1.2, 1.3 sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html, 1.2, 1.3 sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Additional_Resources.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html, 1.2, 1.3 sect-Security_Guide-Kerberos-How_Kerberos_Works.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Kerberos_Terminology.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Kerberos_and_PAM.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html, 1.2, 1.3 sect-Security_Guide-Kerberos.html, 1.2, 1.3 sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html, 1.2, 1.3 sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html, 1.2, 1.3 sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html, 1.2, 1.3 sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html, 1.2, 1.3 sect-Security_Guide-LUKS_Disk_Encryption.html, 1.2, 1.3 sect-Security_Guide-Option_Fields-Access_Control.html, 1.2, 1.3 sect-Security_Guide-Option_Fields-Expansions.html, 1.2, 1.3 sect-Security_Guide-Option_Fields-Shell_Commands.html, 1.2, 1.3 sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html, 1.2, 1.3 sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html, 1.2, 1.3 sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html, 1.2, 1.3 sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html, 1.2, 1.3 sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html, 1.2, 1.3 sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html, 1.2, 1.3 sect-Security_Guide-Securing_FTP-Anonymous_Access.html, 1.2, 1.3 sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html, 1.2, 1.3 sect-Security_Guide-Securing_FTP-User_Accounts.html, 1.2, 1.3 sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html, 1.2, 1.3 sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html, 1.2, 1.3 sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html, 1.2, 1.3 sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html, 1.2, 1.3 sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html, 1.2, 1.3 sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html, 1.2, 1.3 sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html, 1.2, 1.3 sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html, 1.2, 1.3 sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html, 1.2, 1.3 sect-Security_Guide-Security_Updates.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_FTP.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_NFS.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_NIS.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_Portmap.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_Sendmail.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html, 1.2, 1.3 sect-Security_Guide-Server_Security.html, 1.2, 1.3 sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html, 1.2, 1.3 sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html, 1.2, 1.3 sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html, 1.2, 1.3 sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html, 1.2, 1.3 sect-Security_Guide-Single_Sign_on_SSO.html, 1.2, 1.3 sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html, 1.2, 1.3 sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html, 1.2, 1.3 sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_and_xinetd.html, 1.2, 1.3 sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html, 1.2, 1.3 sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html, 1.2, 1.3 sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html, 1.2, 1.3 sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html, 1.2, 1.3 sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html, 1.2, 1.3 sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs.html, 1.2, 1.3 sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html, 1.2, 1.3 sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html, 1.2, 1.3 sect-Security_Guide-Vulnerability_Assessment.html, 1.2, 1.3 sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html, 1.2, 1.3 sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html, 1.2, 1.3
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: sparks
Update of /cvs/fedora/web/html/docs/security-guide/f10/en_US/Common_Content/css
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv21374/Common_Content/css
Modified Files:
common.css
Log Message:
Integrated RH information. All wiki data included.
Index: common.css
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f10/en_US/Common_Content/css/common.css,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- common.css 22 Dec 2008 19:28:45 -0000 1.1
+++ common.css 16 Jan 2009 23:15:10 -0000 1.2
@@ -31,7 +31,7 @@
/* desktop styles */
body.desktop {
- margin-left: 24em;
+ margin-left: 26em;
}
body.desktop .book > .toc {
@@ -44,7 +44,6 @@
left:0px;
padding-left:1em;
background-color:#EEEEEE;
- font-size: 0.8em;
}
.toc {
@@ -60,7 +59,6 @@
display:block;
}
-
span.appendix, span.glossary {
display:block;
margin-top:0.5em;
@@ -74,7 +72,7 @@
padding-top:1em;
}
-p {
+p, div.para, div.formalpara {
padding-top:0px;
margin-top:0.3em;
padding-bottom:0px;
@@ -99,7 +97,7 @@
color:#999;
}
-.toc a {
+.toc a, .qandaset a {
font-weight:normal;
}
@@ -232,7 +230,7 @@
text-decoration: none;
}
-.languages li p {
+.languages li p, .languages li div.para {
display:inline;
}
@@ -254,14 +252,13 @@
/*unique to the webpage only*/
.article ul {
- margin:0em;
padding-left:2em;
+ list-style: disc;
}
.article li {
margin:0em;
padding-left:0em;
- list-style: disc;
}
.books {
@@ -381,7 +378,7 @@
text-align:left;
}
-.revhistory tr td p {
+.revhistory tr td p, .revhistory tr td div.para {
text-align:left;
font-weight:bold;
display:block;
@@ -416,17 +413,23 @@
padding: 0em;
margin: 0em;
padding-top: 1em;
+ margin-top: 1em;
}
.author,
.editor,
.translator,
-.othercredit {
- display:block;
+.othercredit,
+.contrib {
+ display: block;
+}
+
+.revhistory .author {
+ display: inline;
}
.othercredit h3 {
- padding-top:1em;
+ padding-top: 1em;
}
@@ -442,9 +445,10 @@
.copyright {
margin-top: 1em;
}
+
/* qanda sets */
.answer {
- padding-bottom:1em;
+ margin-bottom:1em;
border-bottom:1px dotted #ccc;
}
@@ -470,12 +474,14 @@
}
/* inline syntax highlighting */
+
+/* inline syntax highlighting */
.hl-keyword {
color: #002F5D;
}
.hl-string {
- color: #00774B;
+ color: #5C3566;
}
.hl-comment {
@@ -483,7 +489,8 @@
}
.hl-tag {
- color: #002F5D;
+ color: #A62C2C;
+ font-weight:bold;
}
.hl-attribute {
@@ -491,11 +498,11 @@
}
.hl-value {
- color: #4E376B;
+ color: #5C3566;
}
.hl-html {
- color:#002F5D;
+ color: #002F5D;
}
.hl-xslt {
@@ -507,13 +514,29 @@
}
.hl-directive {
- color: #002F5D;
+ color: #4E9A06;
+
}
.hl-doctype {
- color: #002F5D;
+ color: #CE5C00;
+
+}
+
+.hl-annotation {
+ color: #CE5C00;
+
+}
+
+.hl-number {
+ color: #CE5C00;
+
}
+.hl-doccomment {
+ color: #CE5C00;
+
+}
/*Lists*/
ul {
@@ -558,6 +581,7 @@
margin:0em;
margin-left:2em;
padding-top:0em;
+ padding-bottom: 1em;
}
li {
@@ -567,7 +591,7 @@
margin-bottom:0.4em;
}
-li p {
+li p, li div.para {
padding-top:0px;
margin-top:0em;
padding-bottom:0px;
@@ -690,8 +714,9 @@
}
div.note pre, div.important pre, div.warning pre {
- background-color:#333;
- color:white;
+ background-color: #333;
+ color: white;
+ margin-left: 4.5em;
}
@@ -761,33 +786,43 @@
}
/*notification icons*/
-div.note h2, div.note p, div.warning h2, div.warning p, div.important h2, .important p {
+div.note h2, div.note p, div.note div.para, div.warning h2, div.warning p, div.warning div.para, div.important h2, .important p, .important div.para {
padding:0em;
margin:0em;
padding-left:56px;
}
/*Page Title*/
-#title strong {
- display:none;
+#title {
+ display:block;
+ height:45px;
+ padding-bottom:1em;
+ margin:0em;
}
-#title a {
+#title a.left{
+ display:inline;
border:none;
- display:block;
- height:45px;
- width:110px;
padding-left:200px;
- background:transparent url(../images/image_left.png) top left no-repeat;
}
-#title {
- display:block;
- height:45px;
- background:transparent url(../images/image_right.png) top right no-repeat;
+#title a.left img{
+ border:none;
+ float:left;
+ margin:0em;
+ margin-top:.7em;
+}
+
+#title a.right {
padding-bottom:1em;
}
+#title a.right img {
+ border:none;
+ float:right;
+ margin:0em;
+}
+
/*Table*/
table {
border:1px solid #6c614b;
@@ -810,7 +845,8 @@
background-color:#f5f5f5;
}
-table th p:first-child, table td p:first-child, table li p:first-child {
+table th p:first-child, table td p:first-child, table li p:first-child,
+table th div.para:first-child, table td div.para:first-child, table li div.para:first-child {
margin-top:0em;
padding-top:0em;
display:inline;
@@ -1009,7 +1045,7 @@
text-decoration:none;
}
-.footnote p {
+.footnote p,.footnote div.para {
padding-left:5em;
}
@@ -1041,17 +1077,7 @@
color:white;
}
-.authorgroup h4 {
- padding:0em;
- margin:0em;
- margin-top:1em;
-}
-
-.author, .editor, .translator, .othercredit {
- display:block;
-}
-
-ul li p:last-child {
+ul li p:last-child, ul li div.para:last-child {
margin-bottom:0em;
padding-bottom:0em;
}
@@ -1106,8 +1132,8 @@
}
.docnav li.previous strong, .docnav li.next strong {
- display:block;
height:22px;
+ display:block;
}
.docnav {
@@ -1118,6 +1144,7 @@
.docnav li.next a strong {
background: url(../images/stock-go-forward.png) top right no-repeat;
padding-top:3px;
+ padding-bottom:4px;
padding-right:28px;
font-size:1.2em;
}
@@ -1125,7 +1152,9 @@
.docnav li.previous a strong {
background: url(../images/stock-go-back.png) top left no-repeat;
padding-top:3px;
+ padding-bottom:4px;
padding-left:28px;
+ padding-right:0.5em;
font-size:1.2em;
}
@@ -1341,6 +1370,56 @@
text-align: center;
}
-span.remark{
- background-color: #ffff00;
+span.remark {
+ background-color: #ff00ff;
+}
+
+.draft {
+ background-image: url(../images/watermark-draft.png);
+ background-repeat: repeat-y;
+ background-position: center;
+}
+
+.foreignphrase {
+ font-style: inherit;
+}
+
+dt {
+ clear:both;
+}
+
+dt img {
+ border-style: none;
+ max-width: 112px;
+}
+
+dt object {
+ max-width: 112px;
+}
+
+dt .inlinemediaobject, dt object {
+ display: inline;
+ float: left;
+ margin-bottom: 1em;
+ padding-right: 1em;
+ width: 112px;
+}
+
+dl:after {
+ display: block;
+ clear: both;
+ content: "";
+}
+
+.toc dd {
+ padding-bottom: 0em;
+ margin-bottom: 1em;
+ padding-left: 1.3em;
+ margin-left: 0em;
+}
+
+div.toc > dl > dt {
+ padding-bottom: 0em;
+ margin-bottom: 0em;
+ margin-top: 1em;
}
- Previous message (by thread): web/html/docs/security-guide/f10/en_US/Common_Content/images watermark-draft.png, NONE, 1.1 title_logo.png, 1.1, 1.2
- Next message (by thread): web/html/docs/security-guide/f10/en_US sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html, NONE, 1.1 sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html, NONE, 1.1 sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html, NONE, 1.1 sect-Security_Guide-Encryption-Using_GPG.html, NONE, 1.1 Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html, 1.2, 1.3 Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html, 1.2, 1.3 Security_Guide-Encryption-Data_in_Motion.html, 1.2, 1.3 Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html, 1.2, 1.3 We_Need_Feedback.html, 1.2, 1.3 chap-Security_Guide-Encryption.html, 1.2, 1.3 chap-Security_Guide-General_Principles_of_Information_Security.html, 1.2, 1.3 chap-Security_Guide-References.html, 1.2, 1.3 chap-Security_Guide-Secure_Installation.html, 1.2, 1.3 chap-Security_Guide-Securing_Your_Network.html, 1.2, 1.3 chap-Security_Guide-Security_Overview.html, 1.2, 1.3 chap-Security_Guide-Software_Maintenance.html, 1.2, 1.3 index.html, 1.2, 1.3 pref-Security_Guide-Preface.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Related_Books.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Related_Documentation.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html, 1.2, 1.3 sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html, 1.2, 1.3 sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html, 1.2, 1.3 sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html, 1.2, 1.3 sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html, 1.2, 1.3 sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html, 1.2, 1.3 sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html, 1.2, 1.3 sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html, 1.2, 1.3 sect-Security_Guide-Attackers_and_Vulnerabilities.html, 1.2, 1.3 sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html, 1.2, 1.3 sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html, 1.2, 1.3 sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html, 1.2, 1.3 sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html, 1.2, 1.3 sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html, 1.2, 1.3 sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html, 1.2, 1.3 sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html, 1.2, 1.3 sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html, 1.2, 1.3 sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html, 1.2, 1.3 sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html, 1.2, 1.3 sect-Security_Guide-Common_Exploits_and_Attacks.html, 1.2, 1.3 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html, 1.2, 1.3 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html, 1.2, 1.3 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html, 1.2, 1.3 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html, 1.2, 1.3 sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html, 1.2, 1.3 sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html, 1.2, 1.3 sect-Security_Guide-Evaluating_the_Tools-Nessus.html, 1.2, 1.3 sect-Security_Guide-Evaluating_the_Tools-Nikto.html, 1.2, 1.3 sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html, 1.2, 1.3 sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html, 1.2, 1.3 sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html, 1.2, 1.3 sect-Security_Guide-Firewalls-Additional_Resources.html, 1.2, 1.3 sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html, 1.2, 1.3 sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html, 1.2, 1.3 sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html, 1.2, 1.3 sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html, 1.2, 1.3 sect-Security_Guide-Firewalls-IPv6.html, 1.2, 1.3 sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html, 1.2, 1.3 sect-Security_Guide-Firewalls-Using_IPTables.html, 1.2, 1.3 sect-Security_Guide-Firewalls.html, 1.2, 1.3 sect-Security_Guide-IPTables-Additional_Resources.html, 1.2, 1.3 sect-Security_Guide-IPTables-Command_Options_for_IPTables.html, 1.2, 1.3 sect-Security_Guide-IPTables-Differences_Between_IPTables_and_IPChains.html, 1.2, 1.3 sect-Security_Guide-IPTables-IPTables_Control_Scripts.html, 1.2, 1.3 sect-Security_Guide-IPTables-IPTables_and_IPv6.html, 1.2, 1.3 sect-Security_Guide-IPTables-Saving_IPTables_Rules.html, 1.2, 1.3 sect-Security_Guide-IPTables.html, 1.2, 1.3 sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html, 1.2, 1.3 sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html, 1.2, 1.3 sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html, 1.2, 1.3 sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html, 1.2, 1.3 sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Additional_Resources.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html, 1.2, 1.3 sect-Security_Guide-Kerberos-How_Kerberos_Works.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Kerberos_Terminology.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Kerberos_and_PAM.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html, 1.2, 1.3 sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html, 1.2, 1.3 sect-Security_Guide-Kerberos.html, 1.2, 1.3 sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html, 1.2, 1.3 sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html, 1.2, 1.3 sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html, 1.2, 1.3 sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html, 1.2, 1.3 sect-Security_Guide-LUKS_Disk_Encryption.html, 1.2, 1.3 sect-Security_Guide-Option_Fields-Access_Control.html, 1.2, 1.3 sect-Security_Guide-Option_Fields-Expansions.html, 1.2, 1.3 sect-Security_Guide-Option_Fields-Shell_Commands.html, 1.2, 1.3 sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html, 1.2, 1.3 sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html, 1.2, 1.3 sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html, 1.2, 1.3 sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html, 1.2, 1.3 sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html, 1.2, 1.3 sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html, 1.2, 1.3 sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html, 1.2, 1.3 sect-Security_Guide-Securing_FTP-Anonymous_Access.html, 1.2, 1.3 sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html, 1.2, 1.3 sect-Security_Guide-Securing_FTP-User_Accounts.html, 1.2, 1.3 sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html, 1.2, 1.3 sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html, 1.2, 1.3 sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html, 1.2, 1.3 sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html, 1.2, 1.3 sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html, 1.2, 1.3 sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html, 1.2, 1.3 sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html, 1.2, 1.3 sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html, 1.2, 1.3 sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html, 1.2, 1.3 sect-Security_Guide-Security_Updates.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_FTP.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_NFS.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_NIS.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_Portmap.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_Sendmail.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html, 1.2, 1.3 sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html, 1.2, 1.3 sect-Security_Guide-Server_Security.html, 1.2, 1.3 sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html, 1.2, 1.3 sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html, 1.2, 1.3 sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html, 1.2, 1.3 sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html, 1.2, 1.3 sect-Security_Guide-Single_Sign_on_SSO.html, 1.2, 1.3 sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html, 1.2, 1.3 sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html, 1.2, 1.3 sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html, 1.2, 1.3 sect-Security_Guide-TCP_Wrappers_and_xinetd.html, 1.2, 1.3 sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html, 1.2, 1.3 sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html, 1.2, 1.3 sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html, 1.2, 1.3 sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html, 1.2, 1.3 sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html, 1.2, 1.3 sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html, 1.2, 1.3 sect-Security_Guide-Virtual_Private_Networks_VPNs.html, 1.2, 1.3 sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html, 1.2, 1.3 sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html, 1.2, 1.3 sect-Security_Guide-Vulnerability_Assessment.html, 1.2, 1.3 sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html, 1.2, 1.3 sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html, 1.2, 1.3
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the Fedora-docs-commits
mailing list