web/html/docs/security-guide/f12/nl-NL/html Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html, 1.1, 1.2 Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html, 1.1, 1.2 Security_Guide-Encryption-Data_in_Motion.html, 1.1, 1.2 Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html, 1.1, 1.2 We_Need_Feedback.html, 1.1, 1.2 chap-Security_Guide-Encryption.html, 1.1, 1.2 chap-Security_Guide-General_Principles_of_Information_Security.html, 1.1, 1.2 chap-Security_Guide-References.html, 1.1, 1.2 chap-Security_Guide-Secure_Installation.html, 1.1, 1.2 chap-Security_Guide-Securing_Your_Network.html, 1.1, 1.2 chap-Security_Guide-Security_Overview.html, 1.1, 1.2 chap-Security_Guide-Software_Maintenance.html, 1.1, 1.2 index.html, 1.1, 1.2 pref-Security_Guide-Preface.html, 1.1, 1.2 sect-Security_Guide-Additional_Resources-Related_Books.html, 1.1, 1.2 sect-Security_Guide-Additional_Resources-Related_Documentation.html, 1.1, 1.2 sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html, 1.1, 1.2 sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html, 1.1, 1.2 sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html, 1.1, 1.2 sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html, 1.1, 1.2 sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html, 1.1, 1.2 sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html, 1.1, 1.2 sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html, 1.1, 1.2 sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html, 1.1, 1.2 sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html, 1.1, 1.2 sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html, 1.1, 1.2 sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html, 1.1, 1.2 sect-Security_Guide-Attackers_and_Vulnerabilities.html, 1.1, 1.2 sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html, 1.1, 1.2 sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html, 1.1, 1.2 sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html, 1.1, 1.2 sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html, 1.1, 1.2 sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html, 1.1, 1.2 sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html, 1.1, 1.2 sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html, 1.1, 1.2 sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html, 1.1, 1.2 sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html, 1.1, 1.2 sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html, 1.1, 1.2 sect-Security_Guide-Common_Exploits_and_Attacks.html, 1.1, 1.2 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html, 1.1, 1.2 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html, 1.1, 1.2 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html, 1.1, 1.2 sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html, 1.1, 1.2 sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html, 1.1, 1.2 sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html, 1.1, 1.2 sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html, 1.1, 1.2 sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html, 1.1, 1.2 sect-Security_Guide-Encryption-Using_GPG.html, 1.1, 1.2 sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html, 1.1, 1.2 sect-Security_Guide-Evaluating_the_Tools-Nessus.html, 1.1, 1.2 sect-Security_Guide-Evaluating_the_Tools-Nikto.html, 1.1, 1.2 sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html, 1.1, 1.2 sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html, 1.1, 1.2 sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html, 1.1, 1.2 sect-Security_Guide-Firewalls-Additional_Resources.html, 1.1, 1.2 sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html, 1.1, 1.2 sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html, 1.1, 1.2 sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html, 1.1, 1.2 sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html, 1.1, 1.2 sect-Security_Guide-Firewalls-IPv6.html, 1.1, 1.2 sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html, 1.1, 1.2 sect-Security_Guide-Firewalls-Using_IPTables.html, 1.1, 1.2 sect-Security_Guide-Firewalls.html, 1.1, 1.2 sect-Security_Guide-IPTables-Additional_Resources.html, 1.1, 1.2 sect-Security_Guide-IPTables-Command_Options_for_IPTables.html, 1.1, 1.2 sect-Security_Guide-IPTables-IPTables_Control_Scripts.html, 1.1, 1.2 sect-Security_Guide-IPTables-IPTables_and_IPv6.html, 1.1, 1.2 sect-Security_Guide-IPTables-Saving_IPTables_Rules.html, 1.1, 1.2 sect-Security_Guide-IPTables.html, 1.1, 1.2 sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html, 1.1, 1.2 sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html, 1.1, 1.2 sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html, 1.1, 1.2 sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html, 1.1, 1.2 sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html, 1.1, 1.2 sect-Security_Guide-Kerberos-Additional_Resources.html, 1.1, 1.2 sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html, 1.1, 1.2 sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html, 1.1, 1.2 sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html, 1.1, 1.2 sect-Security_Guide-Kerberos-How_Kerberos_Works.html, 1.1, 1.2 sect-Security_Guide-Kerberos-Kerberos_Terminology.html, 1.1, 1.2 sect-Security_Guide-Kerberos-Kerberos_and_PAM.html, 1.1, 1.2 sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html, 1.1, 1.2 sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html, 1.1, 1.2 sect-Security_Guide-Kerberos.html, 1.1, 1.2 sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html, 1.1, 1.2 sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html, 1.1, 1.2 sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html, 1.1, 1.2 sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html, 1.1, 1.2 sect-Security_Guide-LUKS_Disk_Encryption.html, 1.1, 1.2 sect-Security_Guide-Option_Fields-Access_Control.html, 1.1, 1.2 sect-Security_Guide-Option_Fields-Expansions.html, 1.1, 1.2 sect-Security_Guide-Option_Fields-Shell_Commands.html, 1.1, 1.2 sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html, 1.1, 1.2 sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html, 1.1, 1.2 sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html, 1.1, 1.2 sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html, 1.1, 1.2 sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html, 1.1, 1.2 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html, 1.1, 1.2 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html, 1.1, 1.2 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html, 1.1, 1.2 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html, 1.1, 1.2 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html, 1.1, 1.2 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html, 1.1, 1.2 sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html, 1.1, 1.2 sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html, 1.1, 1.2 sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html, 1.1, 1.2 sect-Security_Guide-Securing_FTP-Anonymous_Access.html, 1.1, 1.2 sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html, 1.1, 1.2 sect-Security_Guide-Securing_FTP-User_Accounts.html, 1.1, 1.2 sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html, 1.1, 1.2 sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html, 1.1, 1.2 sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html, 1.1, 1.2 sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html, 1.1, 1.2 sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html, 1.1, 1.2 sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html, 1.1, 1.2 sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html, 1.1, 1.2 sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html, 1.1, 1.2 sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html, 1.1, 1.2 sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html, 1.1, 1.2 sect-Security_Guide-Security_Updates.html, 1.1, 1.2 sect-Security_Guide-Server_Security-Securing_FTP.html, 1.1, 1.2 sect-Security_Guide-Server_Security-Securing_NFS.html, 1.1, 1.2 sect-Security_Guide-Server_Security-Securing_NIS.html, 1.1, 1.2 sect-Security_Guide-Server_Security-Securing_Portmap.html, 1.1, 1.2 sect-Security_Guide-Server_Security-Securing_Sendmail.html, 1.1, 1.2 sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html, 1.1, 1.2 sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html, 1.1, 1.2 sect-Security_Guide-Server_Security.html, 1.1, 1.2 sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html, 1.1, 1.2 sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html, 1.1, 1.2 sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html, 1.1, 1.2 sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html, 1.1, 1.2 sect-Security_Guide-Single_Sign_on_SSO.html, 1.1, 1.2 sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html, 1.1, 1.2 sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html, 1.1, 1.2 sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html, 1.1, 1.2 sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html, 1.1, 1.2 sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html, 1.1, 1.2 sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html, 1.1, 1.2 sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html, 1.1, 1.2 sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html, 1.1, 1.2 sect-Security_Guide-TCP_Wrappers_and_xinetd.html, 1.1, 1.2 sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html, 1.1, 1.2 sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html, 1.1, 1.2 sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html, 1.1, 1.2 sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html, 1.1, 1.2 sect-Security_Guide-Updating_Packages-Applying_the_Changes.html, 1.1, 1.2 sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html, 1.1, 1.2 sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html, 1.1, 1.2 sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html, 1.1, 1.2 sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html, 1.1, 1.2 sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html, 1.1, 1.2 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html, 1.1, 1.2 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html, 1.1, 1.2 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html, 1.1, 1.2 sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html, 1.1, 1.2 sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html, 1.1, 1.2 sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html, 1.1, 1.2 sect-Security_Guide-Virtual_Private_Networks_VPNs.html, 1.1, 1.2 sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html, 1.1, 1.2 sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html, 1.1, 1.2 sect-Security_Guide-Vulnerability_Assessment.html, 1.1, 1.2 sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html, 1.1, 1.2 sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html, 1.1, 1.2

Rüdiger Landmann rlandmann at fedoraproject.org
Tue Nov 17 21:55:17 UTC 2009


Author: rlandmann

Update of /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv1556/nl-NL/html

Modified Files:
	Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html 
	Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html 
	Security_Guide-Encryption-Data_in_Motion.html 
	Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html 
	We_Need_Feedback.html chap-Security_Guide-Encryption.html 
	chap-Security_Guide-General_Principles_of_Information_Security.html 
	chap-Security_Guide-References.html 
	chap-Security_Guide-Secure_Installation.html 
	chap-Security_Guide-Securing_Your_Network.html 
	chap-Security_Guide-Security_Overview.html 
	chap-Security_Guide-Software_Maintenance.html index.html 
	pref-Security_Guide-Preface.html 
	sect-Security_Guide-Additional_Resources-Related_Books.html 
	sect-Security_Guide-Additional_Resources-Related_Documentation.html 
	sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html 
	sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html 
	sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html 
	sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html 
	sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html 
	sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html 
	sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html 
	sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html 
	sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html 
	sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html 
	sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html 
	sect-Security_Guide-Attackers_and_Vulnerabilities.html 
	sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html 
	sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html 
	sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html 
	sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html 
	sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html 
	sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html 
	sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html 
	sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html 
	sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html 
	sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html 
	sect-Security_Guide-Common_Exploits_and_Attacks.html 
	sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html 
	sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html 
	sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html 
	sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html 
	sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html 
	sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html 
	sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html 
	sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html 
	sect-Security_Guide-Encryption-Using_GPG.html 
	sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html 
	sect-Security_Guide-Evaluating_the_Tools-Nessus.html 
	sect-Security_Guide-Evaluating_the_Tools-Nikto.html 
	sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html 
	sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html 
	sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html 
	sect-Security_Guide-Firewalls-Additional_Resources.html 
	sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html 
	sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html 
	sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html 
	sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html 
	sect-Security_Guide-Firewalls-IPv6.html 
	sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html 
	sect-Security_Guide-Firewalls-Using_IPTables.html 
	sect-Security_Guide-Firewalls.html 
	sect-Security_Guide-IPTables-Additional_Resources.html 
	sect-Security_Guide-IPTables-Command_Options_for_IPTables.html 
	sect-Security_Guide-IPTables-IPTables_Control_Scripts.html 
	sect-Security_Guide-IPTables-IPTables_and_IPv6.html 
	sect-Security_Guide-IPTables-Saving_IPTables_Rules.html 
	sect-Security_Guide-IPTables.html 
	sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html 
	sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html 
	sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html 
	sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html 
	sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html 
	sect-Security_Guide-Kerberos-Additional_Resources.html 
	sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html 
	sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html 
	sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html 
	sect-Security_Guide-Kerberos-How_Kerberos_Works.html 
	sect-Security_Guide-Kerberos-Kerberos_Terminology.html 
	sect-Security_Guide-Kerberos-Kerberos_and_PAM.html 
	sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html 
	sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html 
	sect-Security_Guide-Kerberos.html 
	sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html 
	sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html 
	sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html 
	sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html 
	sect-Security_Guide-LUKS_Disk_Encryption.html 
	sect-Security_Guide-Option_Fields-Access_Control.html 
	sect-Security_Guide-Option_Fields-Expansions.html 
	sect-Security_Guide-Option_Fields-Shell_Commands.html 
	sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html 
	sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html 
	sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html 
	sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html 
	sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html 
	sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html 
	sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html 
	sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html 
	sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html 
	sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html 
	sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html 
	sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html 
	sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html 
	sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html 
	sect-Security_Guide-Securing_FTP-Anonymous_Access.html 
	sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html 
	sect-Security_Guide-Securing_FTP-User_Accounts.html 
	sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html 
	sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html 
	sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html 
	sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html 
	sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html 
	sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html 
	sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html 
	sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html 
	sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html 
	sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html 
	sect-Security_Guide-Security_Updates.html 
	sect-Security_Guide-Server_Security-Securing_FTP.html 
	sect-Security_Guide-Server_Security-Securing_NFS.html 
	sect-Security_Guide-Server_Security-Securing_NIS.html 
	sect-Security_Guide-Server_Security-Securing_Portmap.html 
	sect-Security_Guide-Server_Security-Securing_Sendmail.html 
	sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html 
	sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html 
	sect-Security_Guide-Server_Security.html 
	sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html 
	sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html 
	sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html 
	sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html 
	sect-Security_Guide-Single_Sign_on_SSO.html 
	sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html 
	sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html 
	sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html 
	sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html 
	sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html 
	sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html 
	sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html 
	sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html 
	sect-Security_Guide-TCP_Wrappers_and_xinetd.html 
	sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html 
	sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html 
	sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html 
	sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html 
	sect-Security_Guide-Updating_Packages-Applying_the_Changes.html 
	sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html 
	sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html 
	sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html 
	sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html 
	sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html 
	sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html 
	sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html 
	sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html 
	sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html 
	sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html 
	sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html 
	sect-Security_Guide-Virtual_Private_Networks_VPNs.html 
	sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html 
	sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html 
	sect-Security_Guide-Vulnerability_Assessment.html 
	sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html 
	sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html 
Log Message:
Remove Draft tag from Security Guide


Index: Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html	9 Nov 2009 06:01:37 -0000	1.1
+++ Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.6. Beveiligde shell</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Virtuele privé netwerken"/><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/>
 </a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.6. Beveiligde shell"><div class="titlepage"><div><div><h2 class="title" id="Security_Guide-Encryption-Data_in_Motion-Secure_Shell">3.6. Beveiligde shell</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.6. Beveiligde shell</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Virtuele privé netwerken"/><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></
 p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.6. Beveiligde shell"><div class="titlepage"><div><div><h2 class="title" id="Security_Guide-Encryption-Data_in_Motion-Secure_Shell">3.6. Beveiligde shell</h2></div></div></div><div class="para">
 			Beveiligde shell (SSH) is een krachtig netwerk protocol dat wordt gebruikt om te communiceren met een ander systeem over een beveiligd kanaal. De verzendingen over SSH zijn versleuteld en beschermd tegen onderschepping. Cryptografisch aanloggen kan ook gebruikt worden om een betere authenticatie methode te bieden dan de traditionele gebruikersnamen en wachtwoorden.
 		</div><div class="para">
 			SSH is erg eenvoudig te activeren. Simpel door het starten van de sshd service, zal het systeem beginnen met het accepteren van verbindingen en zal het toegang tot het systeem toestaan als een juiste gebruikersnaam en wachtwoord wordt aangeboden tijdens het verbindings proces. De standaard TCP poort voor de SSH service is 22, dit kan echter veranderd worden door het veranderen van het configuratie bestand <span class="emphasis"><em>/etc/ssh/sshd_config</em></span> en het opnieuw opstarten van de service. Dit bestand bevat ook andere configuratie opties voor SSH.


Index: Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html	9 Nov 2009 06:01:37 -0000	1.1
+++ Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.5. Virtuele privé netwerken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Data in beweging"/><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Beveiligde shell"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="do
 cnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.5. Virtuele privé netwerken"><div class="titlepage"><div><div><h2 class="title" id="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks">3.5. Virtuele privé netwerken</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.5. Virtuele privé netwerken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Data in beweging"/><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Beveiligde shell"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav">
 <li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.5. Virtuele privé netwerken"><div class="titlepage"><div><div><h2 class="title" id="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks">3.5. Virtuele privé netwerken</h2></div></div></div><div class="para">
 			Virtuele privé netwerken (VPN) bieden versleutelde tunnels tussen computers of netwerken van computers over alle poorten. Met een aanwezige VPN wordt alle netwerkverkeer van de cliënt doorgestuurd naar de server via de versleutelde tunnel. Dit betekent dat de cliënt logischerwijs op hetzelfde netwerk is als de server waarmee het verbonden in via de VPN. VPN's komen veel voor en zijn eenvoudig te gebruiken en in te stellen.
 		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Terug</strong>3.4. Data in beweging</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Volgende</strong>3.6. Beveiligde shell</a></li></ul></body></html>
\ No newline at end of file


Index: Security_Guide-Encryption-Data_in_Motion.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/Security_Guide-Encryption-Data_in_Motion.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- Security_Guide-Encryption-Data_in_Motion.html	9 Nov 2009 06:01:38 -0000	1.1
+++ Security_Guide-Encryption-Data_in_Motion.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.4. Data in beweging</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Bestand gebaseerde versleuteling"/><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Virtuele privé netwerken"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image
 _right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.4. Data in beweging"><div class="titlepage"><div><div><h2 class="title" id="Security_Guide-Encryption-Data_in_Motion">3.4. Data in beweging</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.4. Data in beweging</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Bestand gebaseerde versleuteling"/><link rel="next" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html" title="3.5. Virtuele privé netwerken"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right
 .png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.4. Data in beweging"><div class="titlepage"><div><div><h2 class="title" id="Security_Guide-Encryption-Data_in_Motion">3.4. Data in beweging</h2></div></div></div><div class="para">
 			Data in beweging is data die verstuurd wordt over een netwerk. De grootste bedreiging voor data in beweging zijn onderschepping en verandering. Je gebruikersnaam en wachtwoord moeten nooit zonder bescherming over het netwerk verstuurd worden omdat het onderschept kan worden en gebruikt door iemand anders om zich als jou voor te doen of om toegang te krijgen tot gevoelige informatie. Andere privé informatie zoals bankrekening informatie moet ook beschermd worden als het over een netwerk verstuurd wordt. Als de netwerk sessie versleuteld was dan zou je er niet zo druk over hoeven te maken dat data in gevaar wordt gebracht als het verstuurd wordt.
 		</div><div class="para">
 			Data in beweging is in het bijzonder kwetsbaar voor aanvallers omdat de aanvaller zich niet in de buurt van je computer, waarop de data bewaard wordt, hoeft te bevinden, ze hoeven zich slechts ergens langs het pad te bevinden. Versleutelde tunnels kunnen data beschermen langs het communicatie pad.


Index: Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html	9 Nov 2009 06:01:38 -0000	1.1
+++ Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.3. Bestand gebaseerde versleuteling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Volledige schijf versleuteling"/><link rel="next" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Data in beweging"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt=
 "Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.3. Bestand gebaseerde versleuteling"><div class="titlepage"><div><div><h2 class="title" id="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">3.3. Bestand gebaseerde versleuteling</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.3. Bestand gebaseerde versleuteling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Volledige schijf versleuteling"/><link rel="next" href="Security_Guide-Encryption-Data_in_Motion.html" title="3.4. Data in beweging"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docum
 entation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Data_in_Motion.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.3. Bestand gebaseerde versleuteling"><div class="titlepage"><div><div><h2 class="title" id="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">3.3. Bestand gebaseerde versleuteling</h2></div></div></div><div class="para">
 			GnuPG (GPG) is een open bron versie van PGP dat je toestaat om een bestand of een email bericht te tekenen en/of te versleutelen. Dit is nuttig om de integriteit van het bericht of bestand te behouden en ook om de vertrouwelijkheid van de informatie in het bestand of email bericht te beschermen. In het geval van email, biedt GPG dubbele bescherming. Het biedt niet alleen bescherming voor data in rust, maar ook data in beweging bescherming zodra het bericht over het netwerk verstuurd wordt.
 		</div><div class="para">
 			Bestand gebaseerde versleuteling is bedoeld om een bestand te beschermen nadat het je computer heeft verlaten, zoals wanneer je een CD verstuurt met de post. Sommige bestand gebaseerde versleutelings oplossingen laten restanten van het versleutelde bestand achter die een aanvaller die fysieke toegang tot je computer heeft onder sommige omstandigheden kan ontsleutelen. Om de inhoud van zulke bestanden te beschermen voor aanvallers die toegang tot je computer kunnen hebben, gebruik je bestand gebaseerde versleuteling gecombineerd met een andere oplossing zoals volledige schijf versleuteling.


Index: We_Need_Feedback.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/We_Need_Feedback.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- We_Need_Feedback.html	9 Nov 2009 06:01:38 -0000	1.1
+++ We_Need_Feedback.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2. We hebben terugkoppeling nodig!</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="pref-Security_Guide-Preface.html" title="Voorwoord"/><link rel="prev" href="pref-Security_Guide-Preface.html" title="Voorwoord"/><link rel="next" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p"
  href="pref-Security_Guide-Preface.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Security_Overview.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2. We hebben terugkoppeling nodig!"><div class="titlepage"><div><div><h2 class="title" id="We_Need_Feedback">2. We hebben terugkoppeling nodig!</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2. We hebben terugkoppeling nodig!</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="pref-Security_Guide-Preface.html" title="Voorwoord"/><link rel="prev" href="pref-Security_Guide-Preface.html" title="Voorwoord"/><link rel="next" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href=
 "pref-Security_Guide-Preface.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Security_Overview.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2. We hebben terugkoppeling nodig!"><div class="titlepage"><div><div><h2 class="title" id="We_Need_Feedback">2. We hebben terugkoppeling nodig!</h2></div></div></div><div class="para">
 		Meer informatie over het Linux Security Guide project kan gevonden worden op <a href="https://fedorahosted.org/securityguide">https://fedorahosted.org/securityguide</a>
 	</div><div class="para">
 		Om terugkoppeling te geven over de Beveiligings gids, dien je een foutrapport in op <a href="https://bugzilla.redhat.com/enter_bug.cgi?component=security-guide&product=Fedora%20Documentation">https://bugzilla.redhat.com/enter_bug.cgi?component=security-guide&product=Fedora%20Documentation</a>. Selecteer het juiste onderdeel in het uitklap menu.


Index: chap-Security_Guide-Encryption.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/chap-Security_Guide-Encryption.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- chap-Security_Guide-Encryption.html	9 Nov 2009 06:01:38 -0000	1.1
+++ chap-Security_Guide-Encryption.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 3. Versleuteling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.6.2. Nuttige IPTables websites"/><link rel="next" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Volledige schijf versleuteling"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docum
 entation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 3. Versleuteling"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-Encryption">Hoofdstuk 3. Versleuteling</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Data in rust</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html">3.2. Volledige schijf versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_
 Based_Encryption.html">3.3. Bestand gebaseerde versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">3.4. Data in beweging</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html">3.5. Virtuele privé netwerken</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">3.6. Beveiligde shell</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">3.7. LUKS schijf versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. De LUKS implementatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html">3.7.2. Handmatig mappen versleutelen</a></span></dt>
 <dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html">3.7.3. Stap-voor-stap instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html">3.7.4. Wat heb je zojuist bereikt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html">3.7.5. Interessante verwijzingen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html">3.8. 7-Zip versleutelde archieven</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. 7-Zip installatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encry
 pted_Archives-Installation-Instructions.html">3.8.2. Stap-voor-stap installatie instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html">3.8.3. Stap-voor-stap gebruiks instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html">3.8.4. Merk op</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html">3.9. GNU Privacy Guard (GnuPG) gebruiken</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Het maken van GPG sleutels in GNOME</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html">3.9.2. Het maken van GPG sleutels in KDE</a></span></dt><dt><span class="section"><a href="sect-Security_Gu
 ide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html">3.9.3. Het maken van GPG sleutels met de commandoregel</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html">3.9.4. Over publieke sleutel versleuteling</a></span></dt></dl></dd></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 3. Versleuteling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.6.2. Nuttige IPTables websites"/><link rel="next" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html" title="3.2. Volledige schijf versleuteling"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentati
 on Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 3. Versleuteling"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-Encryption">Hoofdstuk 3. Versleuteling</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">3.1. Data in rust</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html">3.2. Volledige schijf versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_
 Encryption.html">3.3. Bestand gebaseerde versleuteling</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">3.4. Data in beweging</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Virtual_Private_Networks.html">3.5. Virtuele privé netwerken</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">3.6. Beveiligde shell</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">3.7. LUKS schijf versleuteling</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. De LUKS implementatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html">3.7.2. Handmatig mappen versleutelen</a></span></dt><dt><s
 pan class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html">3.7.3. Stap-voor-stap instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html">3.7.4. Wat heb je zojuist bereikt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html">3.7.5. Interessante verwijzingen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html">3.8. 7-Zip versleutelde archieven</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. 7-Zip installatie in Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_A
 rchives-Installation-Instructions.html">3.8.2. Stap-voor-stap installatie instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html">3.8.3. Stap-voor-stap gebruiks instructies</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html">3.8.4. Merk op</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html">3.9. GNU Privacy Guard (GnuPG) gebruiken</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html#sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Het maken van GPG sleutels in GNOME</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html">3.9.2. Het maken van GPG sleutels in KDE</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-En
 cryption-Using_GPG-Creating_GPG_Keys_in_KDE.html">3.9.3. Het maken van GPG sleutels met de commandoregel</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html">3.9.4. Over publieke sleutel versleuteling</a></span></dt></dl></dd></dl></div><div class="para">
 		Er zijn twee hoofd types data die beschermd moeten worden: data in beweging en data in rust. Deze verschillende types data worden beschermd op een vergelijkbare manier met gebruik van een vergelijkbare technologie maar de implementatie kan geheel verschillend zijn. Geen enkele beschermings implementatie kan alle mogelijke manier van in gevaar brengen voorkomen omdat dezelfde informatie in rust en in beweging kan zijn op verschillende tijdsmomenten.
 	</div><div class="section" title="3.1. Data in rust"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Encryption-Data_at_Rest">3.1. Data in rust</h2></div></div></div><div class="para">
 			Data is in rust op het moment dat het opgeslagen is op een harde schijf, tape, CD, DVD, of andere media. De grootste bedreiging voor deze informatie is dat het fysiek gestolen wordt. Laptops op vliegvelden, CD's in de post, backup tapes die op de verkeerde plaats terecht komen, dit zijn allemaal voorbeelden van gebeurtenissen waar data in gevaar kan worden gebracht door diefstal. Als de data versleuteld was op de media dan zou je er niet zo druk over hoeven te maken dat de data in gevaar wordt gebracht.


Index: chap-Security_Guide-General_Principles_of_Information_Security.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/chap-Security_Guide-General_Principles_of_Information_Security.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- chap-Security_Guide-General_Principles_of_Information_Security.html	9 Nov 2009 06:01:38 -0000	1.1
+++ chap-Security_Guide-General_Principles_of_Information_Security.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 4. Algemene principes van informatie beveiliging</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Over publieke sleutel versleuteling"/><link rel="next" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Do
 cumentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Secure_Installation.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 4. Algemene principes van informatie beveiliging"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-General_Principles_of_Information_Security">Hoofdstuk 4. Algemene principes van informatie beveiliging</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Tips, gidsen, en gereedschappen</a></span></dt></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 4. Algemene principes van informatie beveiliging</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Over publieke sleutel versleuteling"/><link rel="next" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Document
 ation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Secure_Installation.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 4. Algemene principes van informatie beveiliging"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-General_Principles_of_Information_Security">Hoofdstuk 4. Algemene principes van informatie beveiliging</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">4.1. Tips, gidsen, en gereedschappen</a></span></dt></dl></div><div class="para">
 		De volgende algemene principes geven een overzicht van goede beveiligings praktijken:
 	</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 				versleutel alle data die over het netwerk verstuurd wordt om de-man-in-het-midden aanvallen en afluisteren te helpen voorkomen. Het is belangrijk om authenticatie gegevens, zoals wachtwoorden, te versleutelen.


Index: chap-Security_Guide-References.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/chap-Security_Guide-References.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- chap-Security_Guide-References.html	9 Nov 2009 06:01:38 -0000	1.1
+++ chap-Security_Guide-References.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 7. Referenties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Installeer ondertekende pakketten van goed bekende repositories"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect
 -Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Terug</strong></a></li><li class="next"/></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 7. Referenties"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-References">Hoofdstuk 7. Referenties</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 7. Referenties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Installeer ondertekende pakketten van goed bekende repositories"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Secur
 ity_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Terug</strong></a></li><li class="next"/></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 7. Referenties"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-References">Hoofdstuk 7. Referenties</h2></div></div></div><div class="para">
 		De volgende referenties zijn verwijzingen naar extra informatie die relevant is voor SELinux en Fedora maar die buiten het kader van deze gids valt. Merk op dat door de snelle ontwikkeling van SELinux sommige onderdelen van deze informatie alleen betrekking heeft op specifieke vrijgaves van Fedora.
 	</div><div class="variablelist" title="Boeken" id="vari-Security_Guide-References-Books"><h6>Boeken</h6><dl><dt><span class="term">SELinux by Example</span></dt><dd><div class="para">
 					Mayer, MacMillan, en Caplan


Index: chap-Security_Guide-Secure_Installation.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/chap-Security_Guide-Secure_Installation.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- chap-Security_Guide-Secure_Installation.html	9 Nov 2009 06:01:38 -0000	1.1
+++ chap-Security_Guide-Secure_Installation.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 5. Veilige installatie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Hoofdstuk 4. Algemene principes van informatie beveiliging"/><link rel="next" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. LUKS partitie versleuteling gebruiken"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/ima
 ges/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 5. Veilige installatie"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-Secure_Installation">Hoofdstuk 5. Veilige installatie</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Schijfpartities</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">5.2. LUKS partitie versleuteling gebruiken</a></span></dt></dl></div><div
  class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 5. Veilige installatie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Hoofdstuk 4. Algemene principes van informatie beveiliging"/><link rel="next" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. LUKS partitie versleuteling gebruiken"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/im
 age_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 5. Veilige installatie"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-Secure_Installation">Hoofdstuk 5. Veilige installatie</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Schijfpartities</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">5.2. LUKS partitie versleuteling gebruiken</a></span></dt></dl></div><div class
 ="para">
 		Beveiliging begint met de eerste keer dat je een CD of DVD aanbrengt in je schijfstation om Fedora te installeren. Het veilig instellen van je systeem vanaf het begin maakt het gemakkelijker om later extra beveiligings instellingen te maken.
 	</div><div class="section" title="5.1. Schijfpartities"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Secure_Installation-Disk_Partitions">5.1. Schijfpartities</h2></div></div></div><div class="para">
 			Het NSA beveelt het aanmaken van aparte partities voor /boot, /, /home, /tmp, en /var/tmp aan. De redenen hiervoor zijn verschillend en we zullen elke partitie behandelen.


Index: chap-Security_Guide-Securing_Your_Network.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/chap-Security_Guide-Securing_Your_Network.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- chap-Security_Guide-Securing_Your_Network.html	9 Nov 2009 06:01:38 -0000	1.1
+++ chap-Security_Guide-Securing_Your_Network.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 2. Je netwerk beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. De veranderingen toepassen"/><link rel="next" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class=
 "previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 2. Je netwerk beveiligen"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-Securing_Your_Network">Hoofdstuk 2. Je netwerk beveiligen</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">2.1. Werkstation beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Het onderzoeken van werkstation beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#s
 ect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. BIOS en boot loader beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Wachtwoord beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Administratieve controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Beschikbare netwerk services</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Persoonlijke firewalls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Secu
 rity_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Communicatie gereedschappen met verbeterde beveiliging</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">2.2. Server beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Het beveiligen van services met TCP wrappers en xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">2.2.2. Portmap beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">2.2.3. Het beveiligen van NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">2.2.4. NFS beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Se
 curing_the_Apache_HTTP_Server.html">2.2.5. De Apache HTTP server beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">2.2.6. FTP beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">2.2.7. Sendmail beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">2.2.8. Het verifiëren van welke poorten luisteren</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">2.3. Eenmalig inschrijven (Single sign-on - SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">2.3.2. B
 eginnen met je nieuwe Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">2.3.4. Hoe werkt inloggen met een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">2.4. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Voordelen van PAM</a></span><
 /dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">2.4.2. PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">2.4.3. PAM configuratie bestand formaat</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">2.4.4. Voorbeeld PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">2.4.5. PAM modules aanmaken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">2.4.6. PAM en administratieve legitimatie opslag</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authenticati
 on_Modules_PAM-PAM_and_Device_Ownership.html">2.4.7. PAM en apparaat eigendom</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">2.4.8. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">2.5. TCP wrappers en xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">2.5.2. Configuratie bestanden voor TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">
 2.5.4. xinetd configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">2.5.5. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. Wat is Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">2.6.2. Kerberos terminologie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">2.6.3. Hoe werkt Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">2.6.4. Kerberos en PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">2.6.5. Het instellen van ee
 n Kerberos 5 server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">2.6.6. Het instellen van een Kerberos 5 cliënt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">2.6.7. Domein naar gebied afbeelding</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">2.6.8. Instellen van secundaire KDC's</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">2.6.9. Cross gebieds authenticatie instellen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">2.6.10. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html">2.7. Virtuele privé netwerken (VPN's)</a></span></dt><dd><dl><dt><span class="section"><a hr
 ef="sect-Security_Guide-Virtual_Private_Networks_VPNs.html#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. Hoe werk een VPN?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html">2.7.2. VPN's and Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html">2.7.5. IPsec installatie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html">2.7.6. IPsec host-naar-host configuratie</a></span></dt><dt><span class="sectio
 n"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html">2.7.7. IPsec netwerk-naar-netwerk configuratie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html">2.8. Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter en IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html">2.8.2. Basis firewall instelling</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Using_IPTables.html">2.8.3. IPTables gebruiken</a></span></dt><dt><span class="section"><
 a href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html">2.8.4. Algemene IPTables filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html">2.8.6. Kwaadwillige software en bedrogen IP adressen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html">2.8.7. IPTables en verbindingen volgen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPv6.html">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Additional_Resources.html">2.8.9. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-IPTables.html">2.9. 
 IPTables</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-IPTables.html#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Pakket filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html">2.9.2. Commando opties voor IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html">2.9.3. Het opslaan van IPTables regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html">2.9.4. IPTables controle scripts</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html">2.9.5. IPTables en IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Additional_Resources.html">2.9.6. Extra hulpbronnen</a></span></dt></dl></dd></dl></div><div xml:lang="nl-NL" class="section" title="2.1. Werkstation beveiliging"><div cla
 ss="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Workstation_Security">2.1. Werkstation beveiliging</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 2. Je netwerk beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. De veranderingen toepassen"/><link rel="next" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previ
 ous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 2. Je netwerk beveiligen"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-Securing_Your_Network">Hoofdstuk 2. Je netwerk beveiligen</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">2.1. Werkstation beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Het onderzoeken van werkstation beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Se
 curity_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">2.1.2. BIOS en boot loader beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">2.1.3. Wachtwoord beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">2.1.4. Administratieve controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Available_Network_Services">2.1.5. Beschikbare netwerk services</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">2.1.6. Persoonlijke firewalls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_G
 uide-Workstation_Security-Security_Enhanced_Communication_Tools">2.1.7. Communicatie gereedschappen met verbeterde beveiliging</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">2.2. Server beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">2.2.1. Het beveiligen van services met TCP wrappers en xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">2.2.2. Portmap beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">2.2.3. Het beveiligen van NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">2.2.4. NFS beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing
 _the_Apache_HTTP_Server.html">2.2.5. De Apache HTTP server beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">2.2.6. FTP beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">2.2.7. Sendmail beveiligen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">2.2.8. Het verifiëren van welke poorten luisteren</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">2.3. Eenmalig inschrijven (Single sign-on - SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">2.3.2. Beginne
 n met je nieuwe Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">2.3.4. Hoe werkt inloggen met een Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">2.4. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">2.4.1. Voordelen van PAM</a></span></dt><d
 t><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">2.4.2. PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">2.4.3. PAM configuratie bestand formaat</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">2.4.4. Voorbeeld PAM configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">2.4.5. PAM modules aanmaken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">2.4.6. PAM en administratieve legitimatie opslag</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Mod
 ules_PAM-PAM_and_Device_Ownership.html">2.4.7. PAM en apparaat eigendom</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">2.4.8. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">2.5. TCP wrappers en xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">2.5.1. TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">2.5.2. Configuratie bestanden voor TCP wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">2.5.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">2.5.4.
  xinetd configuratie bestanden</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">2.5.5. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">2.6. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">2.6.1. Wat is Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">2.6.2. Kerberos terminologie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">2.6.3. Hoe werkt Kerberos</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">2.6.4. Kerberos en PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">2.6.5. Het instellen van een Kerb
 eros 5 server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">2.6.6. Het instellen van een Kerberos 5 cliënt</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">2.6.7. Domein naar gebied afbeelding</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">2.6.8. Instellen van secundaire KDC's</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">2.6.9. Cross gebieds authenticatie instellen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">2.6.10. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html">2.7. Virtuele privé netwerken (VPN's)</a></span></dt><dd><dl><dt><span class="section"><a href="se
 ct-Security_Guide-Virtual_Private_Networks_VPNs.html#sect-Security_Guide-Virtual_Private_Networks_VPNs-How_Does_a_VPN_Work">2.7.1. Hoe werk een VPN?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html">2.7.2. VPN's and Fedora</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html">2.7.3. IPsec</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html">2.7.5. IPsec installatie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html">2.7.6. IPsec host-naar-host configuratie</a></span></dt><dt><span class="section"><a 
 href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html">2.7.7. IPsec netwerk-naar-netwerk configuratie</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html">2.8. Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Firewalls.html#sect-Security_Guide-Firewalls-Netfilter_and_IPTables">2.8.1. Netfilter en IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html">2.8.2. Basis firewall instelling</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Using_IPTables.html">2.8.3. IPTables gebruiken</a></span></dt><dt><span class="section"><a href
 ="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html">2.8.4. Algemene IPTables filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html">2.8.6. Kwaadwillige software en bedrogen IP adressen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html">2.8.7. IPTables en verbindingen volgen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-IPv6.html">2.8.8. IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Firewalls-Additional_Resources.html">2.8.9. Extra hulpbronnen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-IPTables.html">2.9. IPTabl
 es</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-IPTables.html#sect-Security_Guide-IPTables-Packet_Filtering">2.9.1. Pakket filtering</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html">2.9.2. Commando opties voor IPTables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html">2.9.3. Het opslaan van IPTables regels</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html">2.9.4. IPTables controle scripts</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html">2.9.5. IPTables en IPv6</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-IPTables-Additional_Resources.html">2.9.6. Extra hulpbronnen</a></span></dt></dl></dd></dl></div><div xml:lang="nl-NL" class="section" title="2.1. Werkstation beveiliging"><div class="ti
 tlepage"><div><div><h2 class="title" id="sect-Security_Guide-Workstation_Security">2.1. Werkstation beveiliging</h2></div></div></div><div class="para">
 		Een Linux omgeving beveiligen begint met het werkstation. Of het gaat om het vergrendelen van een persoonlijke machine of het beveiligen van een bedrijfssysteem, een gezonde beveiligingstactiek begint met de individuele computer. Een computer netwerk slechts zo veilig als zijn zwakste node.
 	</div><div class="section" title="2.1.1. Het onderzoeken van werkstation beveiliging"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">2.1.1. Het onderzoeken van werkstation beveiliging</h3></div></div></div><div class="para">
 			Als de beveiliging van een Fedora werkstation onderzocht wordt, overweeg dan het volgende:


Index: chap-Security_Guide-Security_Overview.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/chap-Security_Guide-Security_Overview.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- chap-Security_Guide-Security_Overview.html	9 Nov 2009 06:01:38 -0000	1.1
+++ chap-Security_Guide-Security_Overview.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 1. Beveiligings overzicht</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="We_Need_Feedback.html" title="2. We hebben terugkoppeling nodig!"/><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey=
 "p" href="We_Need_Feedback.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 1. Beveiligings overzicht"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-Security_Overview">Hoofdstuk 1. Beveiligings overzicht</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security">1.1. Inleiding tot beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. Wat is computer beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt>
 <dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Beveiligings controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusie</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.2. Kwetsbaarheid beoordeling</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Denk als de vijand</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.2.2. Het definiëren van onderzoeken en testen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">
 1.2.3. Het evalueren van de gereedschappen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.3. Aanvallers en kwetsbaarheden</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Een kleine geschiedenis van hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html">1.3.2. Bedreigingen voor netwerk beveiliging</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.3.3. Bedreigingen voor server beveiliging</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.3.4. Bedreigingen voor werkstations en beveiliging van
  thuis PC's</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Veel voorkomende uitbuitingen en aanvallen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Beveiligings vernieuwingen</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Pakketten vernieuwen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Ondertekende pakketten verifiëren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Ondertekende pakketten installeren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. De veranderingen toepassen</a></span></dt></dl></dd></dl></
 div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 1. Beveiligings overzicht</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="We_Need_Feedback.html" title="2. We hebben terugkoppeling nodig!"/><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" hr
 ef="We_Need_Feedback.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 1. Beveiligings overzicht"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-Security_Overview">Hoofdstuk 1. Beveiligings overzicht</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security">1.1. Inleiding tot beveiliging</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. Wat is computer beveiliging</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><s
 pan class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Beveiligings controles</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusie</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.2. Kwetsbaarheid beoordeling</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.2.1. Denk als de vijand</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.2.2. Het definiëren van onderzoeken en testen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.2.3.
  Het evalueren van de gereedschappen</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.3. Aanvallers en kwetsbaarheden</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Een kleine geschiedenis van hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html">1.3.2. Bedreigingen voor netwerk beveiliging</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.3.3. Bedreigingen voor server beveiliging</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis
  PC's</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Veel voorkomende uitbuitingen en aanvallen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Beveiligings vernieuwingen</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Pakketten vernieuwen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Ondertekende pakketten verifiëren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Ondertekende pakketten installeren</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. De veranderingen toepassen</a></span></dt></dl></dd></dl></div><d
 iv class="para">
 		Door het toenemende vertrouwen op krachtige computers in een netwerk om te helpen bedrijven draaiende te houden en contact te houden met onze persoonlijke informatie, zijn complete bedrijven ontstaan rond de praktijk van netwerk en computer beveiliging. Ondernemingen hebben de kennis en vaardigheden van beveiligings deskundigen ingeroepen om systemen correct te controleren en om aangepaste oplossingen te maken voor de werk vereisten van de organisatie. Omdat de meeste organisaties in toenemende mate dynamisch van natuur zijn, met werknemers die de IT hulpbronnen van de onderneming lokaal en op afstand benaderen, is de behoefte aan beveiligde computeromgevingen sterk toegenomen.
 	</div><div class="para">
 		Unfortunately, most organizations (as well as individual users) regard security as an afterthought, a process that is overlooked in favor of increased power, productivity, and budgetary concerns. Proper security implementation is often enacted postmortem — <span class="emphasis"><em>after</em></span> an unauthorized intrusion has already occurred. Security experts agree that taking the correct measures prior to connecting a site to an untrusted network, such as the Internet, is an effective means of thwarting most attempts at intrusion.


Index: chap-Security_Guide-Software_Maintenance.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/chap-Security_Guide-Software_Maintenance.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- chap-Security_Guide-Software_Maintenance.html	9 Nov 2009 06:01:38 -0000	1.1
+++ chap-Security_Guide-Software_Maintenance.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 6. Software onderhoud</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. LUKS partitie versleuteling gebruiken"/><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="C
 ommon_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 6. Software onderhoud"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-Software_Maintenance">Hoofdstuk 6. Software onderhoud</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Installeer minimale software</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">6.2. Het plannen
  en configureren van beveiligingsvernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">6.3. Het aanpassen van automatische vernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">6.4. Installeer ondertekende pakketten van goed bekende repositories</a></span></dt></dl></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Hoofdstuk 6. Software onderhoud</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html" title="5.2. LUKS partitie versleuteling gebruiken"/><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_
 Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="chapter" title="Hoofdstuk 6. Software onderhoud"><div class="titlepage"><div><div><h2 class="title" id="chap-Security_Guide-Software_Maintenance">Hoofdstuk 6. Software onderhoud</h2></div></div></div><div class="toc"><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Installeer minimale software</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">6.2. Het plannen en co
 nfigureren van beveiligingsvernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">6.3. Het aanpassen van automatische vernieuwingen</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">6.4. Installeer ondertekende pakketten van goed bekende repositories</a></span></dt></dl></div><div class="para">
 		Software onderhoud is erg belangrijk om de beveiliging van een systeem te handhaven. Het is van vitaal belang om software te patchen zodra deze beschikbaar komen om aanvallers te verhinderen om bekende problemen te gebruiken om je systeem binnen te dringen.
 	</div><div class="section" title="6.1. Installeer minimale software"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">6.1. Installeer minimale software</h2></div></div></div><div class="para">
 			Het is een goede praktijk om alleen die pakketten te installeren die je wilt gebruiken omdat ieder stukje software op je systeem een kwetsbaarheid kan bevatten. Als je installeert van de DVD media gebruik dan de mogelijkheid om precies die pakketten te selecteren die je tijdens de installatie wilt installeren. Als je ontdekt dat je nog een pakket nodig hebt, kun je het altijd later nog aan je systeem toevoegen.


Index: index.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/index.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- index.html	9 Nov 2009 06:01:39 -0000	1.1
+++ index.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Beveiligings gids</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><meta name="description" content="The Linux Security Guide is designed to assist users of Linux in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Fedora Linux but detailing concepts and techniques valid for all Linux systems, The Linux Security Guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods."/><link rel="home" href="index.html"
  title="Beveiligings gids"/><link rel="next" href="pref-Security_Guide-Preface.html" title="Voorwoord"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"/><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="book" title="Beveiligings gids"><div class="titlepage"><div><div class="producttitle"><span class="productname">Fedora</span> <span class="productnumber">12</span></div><div><h1 id="d0e1" class="title">Beveiligings gids </h1></div><div><h2 class="subtitle">Een gids voor het beveiligen van Fedora Linux</h2></div><p class="edition">Uitgave 1.1</p><div><h3 class="corpauthor">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Beveiligings gids</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><meta name="description" content="The Linux Security Guide is designed to assist users of Linux in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Fedora Linux but detailing concepts and techniques valid for all Linux systems, The Linux Security Guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods."/><link rel="home" href="index.html"
  title="Beveiligings gids"/><link rel="next" href="pref-Security_Guide-Preface.html" title="Voorwoord"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"/><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="book" title="Beveiligings gids"><div class="titlepage"><div><div class="producttitle"><span class="productname">Fedora</span> <span class="productnumber">12</span></div><div><h1 id="d0e1" class="title">Beveiligings gids </h1></div><div><h2 class="subtitle">Een gids voor het beveiligen van Fedora Linux</h2></div><p class="edition">Uitgave 1.1</p><div><h3 class="corpauthor">
 						<span class="inlinemediaobject"><object data="Common_Content/images/title_logo.svg" type="image/svg+xml"> Logo</object></span>
 					</h3></div><div><div xml:lang="nl-NL" class="authorgroup"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat.com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott
 </span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div></div></div><hr/><div><div id="d0e31" class="legalnotice"><h1 class="legalnotice">Bericht</h1><div class="para">
 		Copyright <span class="trademark"/>© 2009 Red Hat, Inc.


Index: pref-Security_Guide-Preface.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/pref-Security_Guide-Preface.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- pref-Security_Guide-Preface.html	9 Nov 2009 06:01:39 -0000	1.1
+++ pref-Security_Guide-Preface.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Voorwoord</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="index.html" title="Beveiligings gids"/><link rel="next" href="We_Need_Feedback.html" title="2. We hebben terugkoppeling nodig!"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Terug</strong></a></li><li class="next"><a acces
 skey="n" href="We_Need_Feedback.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="preface" title="Voorwoord"><div class="titlepage"><div><div><h1 id="pref-Security_Guide-Preface" class="title">Voorwoord</h1></div></div></div><div xml:lang="nl-NL" class="section" title="1. Document Conventie"><div class="titlepage"><div><div><h2 class="title" id="d0e111">1. Document Conventie</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Voorwoord</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="index.html" title="Beveiligings gids"/><link rel="prev" href="index.html" title="Beveiligings gids"/><link rel="next" href="We_Need_Feedback.html" title="2. We hebben terugkoppeling nodig!"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="
 n" href="We_Need_Feedback.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="preface" title="Voorwoord"><div class="titlepage"><div><div><h1 id="pref-Security_Guide-Preface" class="title">Voorwoord</h1></div></div></div><div xml:lang="nl-NL" class="section" title="1. Document Conventie"><div class="titlepage"><div><div><h2 class="title" id="d0e111">1. Document Conventie</h2></div></div></div><div class="para">
 		Dit handboek hanteert verscheidene conventies om bepaalde woorden of zinsdelen te benadrukken en aandacht te vestigen op specifieke delen van informatie.
 	</div><div class="para">
 		In PDF en papieren edities gebruikt dit handboek <a href="https://fedorahosted.org/liberation-fonts/">Liberation Fonts set</a> lettertypen. Het Liberation lettertype wordt ook gebruikt in HTML-edities indien dit lettertype op uw computer geïnstalleerd is. Indien dat niet het geval is, worden alternatieve, gelijkwaardige lettertypen gebruikt. Noot: bij Red Hat Enterprise Linux 5 en later wordt de Liberation Font set standaard meegeleverd.


Index: sect-Security_Guide-Additional_Resources-Related_Books.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Additional_Resources-Related_Books.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Additional_Resources-Related_Books.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Additional_Resources-Related_Books.html	17 Nov 2009 21:54:42 -0000	1.2
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.5.3. Gerelateerde boeken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Nuttige TCP wrapper websites"/><link rel="next" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="
 Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5.3. Gerelateerde boeken"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Related_Books">2.5.5.3. Gerelateerde boeken</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.5.3. Gerelateerde boeken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Nuttige TCP wrapper websites"/><link rel="next" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docume
 ntation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5.3. Gerelateerde boeken"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Related_Books">2.5.5.3. Gerelateerde boeken</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<em class="citetitle">Hacking Linux Exposed</em> door Brian Hatch, James Lee, en George Kurtz; Osbourne/McGraw-Hill — Een uitstekende beveiligings hulpbron met informatie over TCP wrappers en <code class="systemitem">xinetd</code>.
 					</div></li></ul></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Terug</strong>2.5.5.2. Nuttige TCP wrapper websites</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos.html"><strong>Volgende</strong>2.6. Kerberos</a></li></ul></body></html>
\ No newline at end of file


Index: sect-Security_Guide-Additional_Resources-Related_Documentation.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Additional_Resources-Related_Documentation.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Additional_Resources-Related_Documentation.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Additional_Resources-Related_Documentation.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.9.3. Gerelateerde documentatie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Nuttige firewall websites"/><link rel="next" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation S
 ite"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9.3. Gerelateerde documentatie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Related_Documentation">2.8.9.3. Gerelateerde documentatie</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.9.3. Gerelateerde documentatie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Nuttige firewall websites"/><link rel="next" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/>
 </a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9.3. Gerelateerde documentatie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Related_Documentation">2.8.9.3. Gerelateerde documentatie</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<em class="citetitle">Red Hat Linux Firewalls</em>, door Bill McCarty; Red Hat Press — een uitgebreide referentie voor het bouwen netwerk en server firewalls met gebruiken van open bron bron pakket filtering technologie zoals Netfilter en <code class="command">iptables</code>. Het bevat onderwerpen die het analyseren van firewall logs behandelen, het ontwikkelen van firewall regels, en het aanpassen van je firewall met gebruik van meerdere grafische gereedschappen.
 					</div></li><li class="listitem"><div class="para">
 						<em class="citetitle">Linux Firewalls</em>, door Robert Ziegler; New Riders Press — bevat een schat van informatie over het bouwen vn firewalls met gebruik van zowel <code class="command">ipchains</code> van kernel 2.2 als Netfilter en <code class="command">iptables</code>. Extra beveiligings onderwerpen zoals problemen over toegang op afstand en indringings detectie systemen worden ook behandeld.


Index: sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.9.2. Nuttige firewall websites</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Gerelateerde documentatie"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_r
 ight.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9.2. Nuttige firewall websites"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites">2.8.9.2. Nuttige firewall websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.9.2. Nuttige firewall websites</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Gerelateerde documentatie"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.p
 ng" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9.2. Nuttige firewall websites"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites">2.8.9.2. Nuttige firewall websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://www.netfilter.org/">http://www.netfilter.org/</a> — De officiële thuispagina van het Netfilter en <code class="command">iptables</code> project.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.tldp.org/">http://www.tldp.org/</a> — De Linux Documentation Project bevat verscheidene nuttige handleidingen met betrekking tot het maken en beheren van firewalls.


Index: sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.6.2. Nuttige IPTables websites</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.6. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.6. Extra hulpbronnen"/><link rel="next" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></
 p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.6.2. Nuttige IPTables websites"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites">2.9.6.2. Nuttige IPTables websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.6.2. Nuttige IPTables websites</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.6. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.6. Extra hulpbronnen"/><link rel="next" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul 
 class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.6.2. Nuttige IPTables websites"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites">2.9.6.2. Nuttige IPTables websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://www.netfilter.org/">http://www.netfilter.org/</a> — De thuis pagina van het netfilter/iptables project. Bevat verschillende informatie over <code class="command">iptables</code>, inclusief een FAQ voor specifieke problemen en verscheidene nuttige gidsen door Rusty Russell, de Linux IP firewall onderhouder. De HOWTO documenten op de site behandelen onderwerpen zoals basis netwerk concepten, kernel pakket filtering, en NAT configuraties.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.linuxnewbie.org/nhf/Security/IPtables_Basics.html">http://www.linuxnewbie.org/nhf/Security/IPtables_Basics.html</a> — Een inleiding over de manier waarop pakketten door de Linux kernel bewegen, plus een inleiding voor het maken van basis <code class="command">iptables</code> commando's.


Index: sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.10.2. Nuttige Kerberos websites</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png
 " alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.10.2. Nuttige Kerberos websites"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites">2.6.10.2. Nuttige Kerberos websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.10.2. Nuttige Kerberos websites</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt=
 "Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.10.2. Nuttige Kerberos websites"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites">2.6.10.2. Nuttige Kerberos websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://web.mit.edu/kerberos/www/">http://web.mit.edu/kerberos/www/</a> — <em class="citetitle">Kerberos: The Network Authentication Protocol</em> webpagina van MIT.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html">http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html</a> — De Kerberos vaak gestelde vragen (FAQ).


Index: sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.8.2. Nuttige PAM websites</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common
 _Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.8.2. Nuttige PAM websites"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites">2.4.8.2. Nuttige PAM websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.8.2. Nuttige PAM websites</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Conte
 nt/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.8.2. Nuttige PAM websites"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites">2.4.8.2. Nuttige PAM websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://www.kernel.org/pub/linux/libs/pam/">http://www.kernel.org/pub/linux/libs/pam/</a> — De hoofd distributie website voor het Linux-PAM project, deze bevat informatie over verscheidene PAM modules, een FAQ, en extra PAM documentatie.
 					</div><div class="note"><h2>Opmerking</h2><div class="para">
 							De documentatie op bovengenoemde website is voor de laatste vrijgegeven upstream versie van PAM en hoeft niet 100% correct te zijn voor de PAM versie in Fedora.


Index: sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.5.2. Nuttige TCP wrapper websites</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Gerelateerde boeken"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Conte
 nt/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5.2. Nuttige TCP wrapper websites"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites">2.5.5.2. Nuttige TCP wrapper websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.5.2. Nuttige TCP wrapper websites</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Gerelateerde boeken"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/ima
 ges/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5.2. Nuttige TCP wrapper websites"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites">2.5.5.2. Nuttige TCP wrapper websites</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<a href="http://www.xinetd.org">http://www.xinetd.org/</a> — De thuisbasis van <code class="systemitem">xinetd</code>, welke voorbeeld configuratie bestanden bevat, een volledige lijst van eigenschappen, en een informatieve FAQ.
 					</div></li><li class="listitem"><div class="para">
 						<a href="http://www.docstoc.com/docs/2133633/An-Unofficial-Xinetd-Tutorial">http://www.docstoc.com/docs/2133633/An-Unofficial-Xinetd-Tutorial</a> — Een gedegen handleiding die verschillende manieren bespreekt om standaard <code class="systemitem">xinetd</code> configuratie bestanden te optimaliseren voor het bereiken van specifieke beveiligings doelen .


Index: sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4.3.2. Toegangs controle opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen"/><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen"/><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html" title="2.5.4.3.3. Verbindings en omleidings opties"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common
 _Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.2. Toegangs controle opties"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options">2.5.4.3.2. Toegangs controle opties</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4.3.2. Toegangs controle opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen"/><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen"/><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html" title="2.5.4.3.3. Verbindings en omleidings opties"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Conte
 nt/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.2. Toegangs controle opties"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options">2.5.4.3.2. Toegangs controle opties</h5></div></div></div><div class="para">
 					Gebruikers van <code class="systemitem">xinetd</code> services kunnen kiezen om de TCP wrapper host toegangsregels te gebruiken, toegangs controle te bieden met de <code class="systemitem">xinetd</code> configuratie bestanden, of een combinatie van beide. Refereer naar <a class="xref" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers">Paragraaf 2.5.2, “Configuratie bestanden voor TCP wrappers”</a> voor meer informatie over TCP wrapper host toegangs controle bestanden.
 				</div><div class="para">
 					Deze paragraaf bespreekt het gebruik van <code class="systemitem">xinetd</code> om toegang tot de services te controleren.


Index: sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4.3.3. Verbindings en omleidings opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen"/><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Toegangs controle opties"/><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" title="2.5.4.3.4. Hulpbronnen beheer opties"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image
 _left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.3. Verbindings en omleidings opties"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options">2.5.4.3.3. Verbindings en omleidings opties</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4.3.3. Verbindings en omleidings opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen"/><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Toegangs controle opties"/><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" title="2.5.4.3.4. Hulpbronnen beheer opties"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.
 png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.3. Verbindings en omleidings opties"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options">2.5.4.3.3. Verbindings en omleidings opties</h5></div></div></div><div class="para">
 					De service configuratie bestanden voor <code class="systemitem">xinetd</code> ondersteunen het verbinden van de service aan een IP adres en het omleiden van binnenkomende verzoeken voor die service naar een ander IP adres, hostnaam of poort.
 				</div><div class="para">
 					Verbinden wordt gecontroleerd door de <code class="option">bind</code> optie in de service specifieke configuratie bestanden en verbindt de service met het IP adres van het systeem. Als dit ingesteld is, staat de <code class="option">bind</code> optie alleen verzoeken naar het juiste IP adres toe voor toegang naar de service. Je kunt deze methode gebruiken om verschillende services te verbinden met verschillende netwerk interfaces gebaseerd op de vereisten.


Index: sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4.3.4. Hulpbronnen beheer opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen"/><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html" title="2.5.4.3.3. Verbindings en omleidings opties"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Produ
 ct Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.4. Hulpbronnen beheer opties"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options">2.5.4.3.4. Hulpbronnen beheer opties</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4.3.4. Hulpbronnen beheer opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen"/><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html" title="2.5.4.3.3. Verbindings en omleidings opties"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html" title="2.5.5. Extra hulpbronnen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Sit
 e"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Binding_and_Redirection_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3.4. Hulpbronnen beheer opties"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options">2.5.4.3.4. Hulpbronnen beheer opties</h5></div></div></div><div class="para">
 					De <code class="systemitem">xinetd</code> daemon kan een basis niveau van bescherming bieden voor weigering van dienst (DoS) aanvallen. De instructies van de volgende lijst kunnen helpen om de effectiviteit van zo'n aanval te beperken:
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="option">per_source</code> — Definieert het maximum aantal instantiaties van een service per bron IP adres. Het accepteert alleen gehele getallen als argument en kan gebruikt worden in zowel <code class="filename">xinetd.conf</code> als de configuratie bestanden specifiek voor een service in de <code class="filename">xinetd.d/</code> map.


Index: sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.2. Bedreigingen voor netwerk beveiliging</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden"/><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden"/><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedorapro
 ject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.2. Bedreigingen voor netwerk beveiliging"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security">1.3.2. Bedreigingen voor netwerk beveiliging</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.2. Bedreigingen voor netwerk beveiliging</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden"/><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden"/><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.o
 rg"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.2. Bedreigingen voor netwerk beveiliging"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security">1.3.2. Bedreigingen voor netwerk beveiliging</h3></div></div></div><div class="para">
 			Slechte praktijken tijdens het instellen van de volgende aspecten van een netwerk kunnen het risico van een aanval vergroten.
 		</div><div class="section" title="1.3.2.1. Onveilige architecturen"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Network_Security-Insecure_Architectures">1.3.2.1. Onveilige architecturen</h4></div></div></div><div class="para">
 				Een verkeerd ingesteld netwerk is de eerste ingang voor niet bevoegde gebruikers. Om een op vertrouwen gebaseerd, open lokaal netwerk kwetsbaar te laten voor het in grote mate onveilige Internet is zoiets als de deur op een kier laten in een misdadige omgeving — gedurende een willekeurige tijds periode gebeurt er niets, maar <span class="emphasis"><em>uiteindelijk</em></span> benut iemand de mogelijkheid.


Index: sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.3. Bedreigingen voor server beveiliging</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden"/><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Bedreigingen voor netwerk beveiliging"/><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Niet gecorrigeerde services"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="h
 ttp://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3. Bedreigingen voor server beveiliging"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security">1.3.3. Bedreigingen voor server beveiliging</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.3. Bedreigingen voor server beveiliging</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden"/><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Bedreigingen voor netwerk beveiliging"/><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Niet gecorrigeerde services"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://
 docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3. Bedreigingen voor server beveiliging"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security">1.3.3. Bedreigingen voor server beveiliging</h3></div></div></div><div class="para">
 			Server beveiliging is even belangrijk als netwerk beveiliging omdat servers vaak een groot deel van de vitale informatie van een organisatie bevatten. Als een server in gevaar is gebracht, komt zijn gehele inhoud misschien beschikbaar voor de cracker die het naar goeddunken kan stelen of manipuleren. De volgende paragrafen bespreken sommige van de hoofdzaken.
 		</div><div class="section" title="1.3.3.1. Ongebruikte services en open poorten"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Server_Security-Unused_Services_and_Open_Ports">1.3.3.1. Ongebruikte services en open poorten</h4></div></div></div><div class="para">
 				Een volledige installatie van Fedora bevat meer dan 1000 toepassings en bibliotheek pakketten. De meeste serverbeheerders zullen er echter niet voor kiezen om ieder pakket in de distributie te installeren, maar zullen er de voorkeur aangeven om een installatie van basis pakketten uit te voeren, plus een aantal server toepassingen.


Index: sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden"/><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Inherent onveilige services"/><link rel="next" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Kwetsbare cliënt toepassingen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" al
 t="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden"/><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Inherent onveilige services"/><link rel="next" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Kwetsbare cliënt toepassingen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Pro
 duct Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security">1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's</h3></div></div></div><div class="para">
 			Werkstations en thuis PC's zijn misschien niet even vatbaar voor een aanval als netwerken of servers, maar omdat ze vaak gevoelige data bevatten, zoals credit kaart informatie, zijn ze het doelwit van systeem crackers. Werkstations kunnen ook besmet zijn zonder dat de gebruiker dat weet en gebruikt door aanvallers als een "slaaf" machine in gecoördineerde aanvallen. Als gebruikers daarom de kwetsbaarheden van een werkstation kennen, kunnen ze zich de moeite besparen om het operating systeem opnieuw te moeten installeren, of erger, te moeten herstellen van data diefstal.
 		</div><div class="section" title="1.3.4.1. Slechte wachtwoorden"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Bad_Passwords">1.3.4.1. Slechte wachtwoorden</h4></div></div></div><div class="para">
 				Slechte wachtwoorden is een van de eenvoudigste manieren om toegang te krijgen tot een systeem. Voor meer informatie over het vermijden van valkuilen bij het aanmaken van een wachtwoord, refereer je naar <a class="xref" href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security" title="2.1.3. Wachtwoord beveiliging">Paragraaf 2.1.3, “Wachtwoord beveiliging”</a>.


Index: sect-Security_Guide-Attackers_and_Vulnerabilities.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Attackers_and_Vulnerabilities.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Attackers_and_Vulnerabilities.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Attackers_and_Vulnerabilities.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3. Aanvallers en kwetsbaarheden</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticiperen op je toekomstige behoeftes"/><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Bedreigingen voor netwerk beveiliging"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="htt
 p://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.3. Aanvallers en kwetsbaarheden"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Attackers_and_Vulnerabilities">1.3. Aanvallers en kwetsbaarheden</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3. Aanvallers en kwetsbaarheden</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticiperen op je toekomstige behoeftes"/><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html" title="1.3.2. Bedreigingen voor netwerk beveiliging"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://do
 cs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.3. Aanvallers en kwetsbaarheden"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Attackers_and_Vulnerabilities">1.3. Aanvallers en kwetsbaarheden</h2></div></div></div><div class="para">
 		Om een goede beveiligings strategie te plannen en te implementeren, moet je bewust zijn van een paar van de problemen die vastberaden en gemotiveerde hackers uitbuiten om systemen in gevaar te brengen. Voordat we echter in detail gaan over deze problemen, moeten we de terminologie definiëren voor het identificeren van een aanvaller.
 	</div><div class="section" title="1.3.1. Een kleine geschiedenis van hackers"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.3.1. Een kleine geschiedenis van hackers</h3></div></div></div><div class="para">
 			De huidige betekenis van de term <em class="firstterm">hacker</em> heeft een oorsprong die teruggaat naar 1960-er jaren en de Massachusetts Institute of Technology (MIT) Tech Model Railroad Club,welke treinstellen ontwierp op een grote schaal en met complexe details. Hacker was de naam die gebruikt werd voor leden van de club die een slimme truc of workaround voor een probleem ontdekten.


Index: sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html	9 Nov 2009 06:01:39 -0000	1.1
+++ sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2.6. Het activeren van de IPTables service</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. De instellingen opslaan"/><link rel="next" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Co
 mmon_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.6. Het activeren van de IPTables service"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service">2.8.2.6. Het activeren van de IPTables service</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2.6. Het activeren van de IPTables service</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. De instellingen opslaan"/><link rel="next" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_C
 ontent/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.6. Het activeren van de IPTables service"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service">2.8.2.6. Het activeren van de IPTables service</h4></div></div></div><div class="para">
 				De firewall regels zijn alleen actief als de <code class="command">iptables</code> service draait. Om de service handmatig te starten, gebruik je het volgende commando:
 			</div><pre class="screen">[root at myServer ~] # service iptables restart
 </pre><div class="para">


Index: sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2.2. Het aan- en uitzetten van de firewall</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="prev" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Vertrouwde services"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org
 "><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.2. Het aan- en uitzetten van de firewall"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall">2.8.2.2. Het aan- en uitzetten van de firewall</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2.2. Het aan- en uitzetten van de firewall</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="prev" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Vertrouwde services"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img
  src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.2. Het aan- en uitzetten van de firewall"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall">2.8.2.2. Het aan- en uitzetten van de firewall</h4></div></div></div><div class="para">
 				Selecteer een van de volgende opties voor de firewall:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<span class="guilabel"><strong>Uitzetten</strong></span> — De firewall uitzetten geeft complete toegang tot je systeem en er vindt geen beveiligingscontrole plaats. Dit moet alleen geselecteerd worden als je op een vertrouwd netwerk draait (niet het Internet) of als je een aangepaste firewall moet instellen met gebruik van het iptables commandoregel gereedschap.


Index: sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2.4. Andere poorten</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Vertrouwde services"/><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. De instellingen opslaan"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="C
 ommon_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.4. Andere poorten"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports">2.8.2.4. Andere poorten</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2.4. Andere poorten</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html" title="2.8.2.3. Vertrouwde services"/><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html" title="2.8.2.5. De instellingen opslaan"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_
 Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.4. Andere poorten"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports">2.8.2.4. Andere poorten</h4></div></div></div><div class="para">
 				Het <span class="application"><strong>Firewall Configuration Tool</strong></span> gereedschap heeft een <span class="guilabel"><strong>Andere poorten</strong></span> sectie voor het opgeven van specifieke IP poorten als vertrouwd voor <code class="command">iptables</code>. Bijvoorbeeld, om IRC en Internet printing protocol (IPP) toe te staan door de firewall, voeg je de volgende poorten toe in de <span class="guilabel"><strong>Andere poorten</strong></span> sectie:
 			</div><div class="para">
 				<code class="computeroutput">194:tcp,631:tcp</code>


Index: sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2.5. De instellingen opslaan</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Andere poorten"/><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Het activeren van de IPTables service"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedor
 aproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.5. De instellingen opslaan"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings">2.8.2.5. De instellingen opslaan</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2.5. De instellingen opslaan</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Andere poorten"/><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Het activeren van de IPTables service"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproje
 ct.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.5. De instellingen opslaan"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Basic_Firewall_Configuration-Saving_the_Settings">2.8.2.5. De instellingen opslaan</h4></div></div></div><div class="para">
 				Klik op <span class="guibutton"><strong>OK</strong></span> om de veranderingen op te slaan en de firewall aan of uit te zetten. Als <span class="guilabel"><strong>Aanzetten</strong></span> was geselecteerd, worden de geselecteerde opties vertaald naar <code class="command">iptables</code> commando's en weggeschreven naar het <code class="filename">/etc/sysconfig/iptables</code> bestand. De <code class="command">iptables</code> service wordt ook gestart zodat de firewall onmiddellijk na het opslaan van de geselecteerde opties geactiveerd wordt. Als <span class="guilabel"><strong>Uitzetten</strong></span> was geselecteerd, wordt het <code class="filename">/etc/sysconfig/iptables</code> bestand verwijderd en de <code class="command">iptables</code> service wordt onmiddellijk gestopt.
 			</div><div class="para">
 				De geselecteerde opties worden ook naar het <code class="filename">/etc/sysconfig/system-config-securitylevel</code> bestand geschreven zodat de instellingen hersteld kunnen worden als de toepassing de volgende keer opstart. Bewerk dit bestand niet handmatig.


Index: sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2.3. Vertrouwde services</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Het aan- en uitzetten van de firewall"/><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Andere poorten"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedor
 aproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.3. Vertrouwde services"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services">2.8.2.3. Vertrouwde services</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2.3. Vertrouwde services</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Het aan- en uitzetten van de firewall"/><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html" title="2.8.2.4. Andere poorten"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproje
 ct.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Other_Ports.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2.3. Vertrouwde services"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Basic_Firewall_Configuration-Trusted_Services">2.8.2.3. Vertrouwde services</h4></div></div></div><div class="para">
 				Het aanzetten van opties in de <span class="guilabel"><strong>Vertrouwde diensten</strong></span> lijst, laat de opgegeven service door in de firewall.
 			</div><div class="variablelist"><dl><dt><span class="term"><span class="guilabel"><strong>WWW (HTTP)</strong></span></span></dt><dd><div class="para">
 							Het HTTP protocol wordt gebruikt door Apache (en door andere Web servers) om web pagina's beschikbaar te maken. Als je van plan bent om je Web server publiek beschikbaar te maken, selecteer je dit aanvinkhokje. Deze optie is niet nodig om lokaal pagina's te bekijken of voor het ontwikkelen van web pagina's. Deze service vereist dat het <code class="filename">httpd</code> pakket geïnstalleerd is.


Index: sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.2. Commando opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.2.3. IPTables parameter opties"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org
 "><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.2. Commando opties"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Command_Options_for_IPTables-Command_Options">2.9.2.2. Commando opties</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.2. Commando opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.2.3. IPTables parameter opties"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img
  src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.2. Commando opties"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Command_Options_for_IPTables-Command_Options">2.9.2.2. Commando opties</h4></div></div></div><div class="para">
 				Commando opties instrueren <code class="command">iptables</code> om een bepaalde actie uit te voeren. Slechts een commando optie is toegestaan per <code class="command">iptables</code> commando. Met uitzondering van het help commando, worden alle commando's in hoofdletters geschreven.
 			</div><div class="para">
 				De <code class="command">iptables</code> commando's zijn de volgende:


Index: sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.4. IPTables overeenkomst opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.2.3. IPTables parameter opties"/><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.2.4.2. UDP protocol"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org">
 <img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.4. IPTables overeenkomst opties"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options">2.9.2.4. IPTables overeenkomst opties</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.4. IPTables overeenkomst opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html" title="2.9.2.3. IPTables parameter opties"/><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.2.4.2. UDP protocol"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img s
 rc="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.4. IPTables overeenkomst opties"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options">2.9.2.4. IPTables overeenkomst opties</h4></div></div></div><div class="para">
 				Verscheidene netwerk protocollen bieden gespecialiseerde overkomst opties welke ingesteld kunnen worden om overeen te komen met een bepaald pakket gebruikmakend van dat protocol. Het protocol moet echter eerst opgegeven worden in het <code class="command">iptables</code> commando. Bijvoorbeeld, <code class="option">-p <em class="replaceable"><code><protocol-naam></code></em></code> zet opties aan voor het opgegeven protocol. Merk op dat je ook het protocol ID kunt opgeven in plaats van de protocol naam. Refereer naar de volgende voorbeelden, die ieder hetzelfde effect hebben:
 			</div><pre class="screen"><code class="command"> iptables -A INPUT -p icmp --icmp-type any -j ACCEPT </code>
 </pre><pre class="screen"><code class="command"> iptables -A INPUT -p 5813 --icmp-type any -j ACCEPT </code>


Index: sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.3. IPTables parameter opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.2.2. Commando opties"/><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.2.4. IPTables overeenkomst opties"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject
 .org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.3. IPTables parameter opties"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options">2.9.2.3. IPTables parameter opties</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.3. IPTables parameter opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.2.2. Commando opties"/><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.2.4. IPTables overeenkomst opties"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org">
 <img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.3. IPTables parameter opties"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Parameter_Options">2.9.2.3. IPTables parameter opties</h4></div></div></div><div class="para">
 				Bepaalde <code class="command">iptables</code> commando's, zoals diegene die gebruikt worden voor het toevoegen, aansluiten, verwijderen, invoegen, of vervangen van regels in een bepaalde keten, vereisen verschillende parameters om een pakket filterings regel te maken.
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="option">-c</code> — Zet de tellers voor een bepaalde regel op nul. Deze parameter accepteert de <code class="option">PKTS</code> en <code class="option">BYTES</code> opties op gewenste teller op te geven.


Index: sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.6. Lijst opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.2.5. Doel opties"/><link rel="next" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.3. Het opslaan van IPTables regels"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/
 image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.6. Lijst opties"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options">2.9.2.6. Lijst opties</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.6. Lijst opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.2.5. Doel opties"/><link rel="next" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.3. Het opslaan van IPTables regels"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_
 right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.6. Lijst opties"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options">2.9.2.6. Lijst opties</h4></div></div></div><div class="para">
 				Het standaard lijst commando, <code class="command">iptables -L [<keten-naam>]</code>, biedt een basis overzicht van de huidige ketens van de standaard filter tabel. Extra opties bieden meer informatie:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="option">-v</code> — Laat uitgebreide output zien, zoals het aantal pakketten en bytes die elke keten verwerkt heeft, het aantal pakketten en bytes die overeenkwamen met elke regel, en welke interface van toepassing is voor een bepaalde regel.


Index: sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.5. Doel opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.2.4.4. Extra overeenkomst optie modules"/><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.2.6. Lijst opties"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><i
 mg src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.5. Doel opties"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Command_Options_for_IPTables-Target_Options">2.9.2.5. Doel opties</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.5. Doel opties</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.2.4.4. Extra overeenkomst optie modules"/><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.2.6. Lijst opties"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src
 ="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.5. Doel opties"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Command_Options_for_IPTables-Target_Options">2.9.2.5. Doel opties</h4></div></div></div><div class="para">
 				Als een pakket overeenkomt met een bepaalde regel, kan de regel het pakket naar een aantal verschillende doelen sturen welke de juiste actie bepalen. Elke keten heeft een standaard doel, welke gebruikt wordt als geen enkele regel in die keten overeenkomt met een pakket of als geen van de regels die overeenkomen met het pakket een doel opgeven.
 			</div><div class="para">
 				De volgende zijn de standaard doelen:


Index: sect-Security_Guide-Common_Exploits_and_Attacks.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Common_Exploits_and_Attacks.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Common_Exploits_and_Attacks.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Common_Exploits_and_Attacks.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.4. Veel voorkomende uitbuitingen en aanvallen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/><link rel="prev" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Kwetsbare cliënt toepassingen"/><link rel="next" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org
 "><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Security_Updates.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.4. Veel voorkomende uitbuitingen en aanvallen"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Common_Exploits_and_Attacks">1.4. Veel voorkomende uitbuitingen en aanvallen</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.4. Veel voorkomende uitbuitingen en aanvallen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/><link rel="prev" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html" title="1.3.4.2. Kwetsbare cliënt toepassingen"/><link rel="next" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img
  src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Security_Updates.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.4. Veel voorkomende uitbuitingen en aanvallen"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Common_Exploits_and_Attacks">1.4. Veel voorkomende uitbuitingen en aanvallen</h2></div></div></div><div class="para">
 		<a class="xref" href="sect-Security_Guide-Common_Exploits_and_Attacks.html#tabl-Security_Guide-Common_Exploits_and_Attacks-Common_Exploits" title="Tabel 1.1. Veel voorkomende uitbuitingen">Tabel 1.1, “Veel voorkomende uitbuitingen”</a> geeft details van de meest voorkomende uitbuitingen en ingangspunten gebruikt door indringers om toegang te krijgen tot hulpbronnen in het netwerk van een organisatie. De sleutel voor deze veel voorkomende uitbuitingen is de uitleg hoe ze uitgevoerd worden en hoe beheerders hun netwerk kunnen behoeden voor zulke aanvallen.
 	</div><div class="table" id="tabl-Security_Guide-Common_Exploits_and_Attacks-Common_Exploits"><div class="table-contents"><table summary="Veel voorkomende uitbuitingen" border="1"><colgroup><col width="2*"/><col width="4*"/><col width="4*"/></colgroup><thead><tr><th>
 						Uitbuiting


Index: sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.8.2. Stap-voor-stap installatie instructies</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven"/><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven"/><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Stap-voor-stap gebruiks instructies"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs
 .fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.2. Stap-voor-stap installatie instructies"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions">3.8.2. Stap-voor-stap installatie instructies</h3></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.8.2. Stap-voor-stap installatie instructies</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven"/><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven"/><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Stap-voor-stap gebruiks instructies"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedor
 aproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.2. Stap-voor-stap installatie instructies"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions">3.8.2. Stap-voor-stap installatie instructies</h3></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					Open een terminal: <code class="code">Klik op ''Toepassingen'' -> ''Systeemgereedschap'' -> ''Terminalvenster''</code>
 				</div></li><li class="listitem"><div class="para">
 					Installeer 7-Zip met sudo toegang: <code class="code">sudo yum install p7zip</code>


Index: sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.8.4. Merk op</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven"/><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Stap-voor-stap gebruiks instructies"/><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Co
 ntent/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.4. Merk op"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note">3.8.4. Merk op</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.8.4. Merk op</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven"/><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html" title="3.8.3. Stap-voor-stap gebruiks instructies"/><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/
 images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.4. Merk op"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note">3.8.4. Merk op</h3></div></div></div><div class="para">
 			7-Zip wordt niet standaard verstuurd met Microsoft Windows of Mac OS X. Als je jouw 7-Zip bestanden op die platformen moet gebruiken, moet je de juiste versie van 7-Zip op die computers installeren. Zie de 7-Zip <a href="http://www.7-zip.org/download.html">download pagina</a>.
 		</div><div class="para">
 			De File-roller toepassing van Gnome zal jouw .7z bestanden herkennen en proberen ze te openen, maar dit mislukt met een fout. Dit komt omdat File-roller op dit moment het uitpakken van versleutelde 7-Zip bestanden niet ondersteund. Een bug rapport ([http://bugzilla.gnome.org/show_bug.cgi?id=490732 Gnome Bug 490732]) is ingediend.


Index: sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.8.3. Stap-voor-stap gebruiks instructies</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven"/><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Stap-voor-stap installatie instructies"/><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Merk op"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://d
 ocs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.3. Stap-voor-stap gebruiks instructies"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions">3.8.3. Stap-voor-stap gebruiks instructies</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.8.3. Stap-voor-stap gebruiks instructies</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven"/><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Stap-voor-stap installatie instructies"/><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Merk op"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fe
 doraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.8.3. Stap-voor-stap gebruiks instructies"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Usage_Instructions">3.8.3. Stap-voor-stap gebruiks instructies</h3></div></div></div><div class="para">
 			Door het opvolgen van deze instructies kun je jouw "Documenten" map comprimeren en versleutelen. Je originele "Documenten" map blijft ongewijzigd. Deze techniek kan toegepast worden voor elke map of bestand waarnaar je toegang hebt op het bestandssysteem.
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					Open een terminal: <code class="code">Klik op ''Toepassingen'' -> ''Systeemgereedschap'' -> ''Terminalvenster''</code>


Index: sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.8. 7-Zip versleutelde archieven</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Interessante verwijzingen"/><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Stap-voor-stap installatie instructies"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Co
 mmon_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.8. 7-Zip versleutelde archieven"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives">3.8. 7-Zip versleutelde archieven</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.8. 7-Zip versleutelde archieven</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Interessante verwijzingen"/><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html" title="3.8.2. Stap-voor-stap installatie instructies"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_C
 ontent/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation-Instructions.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.8. 7-Zip versleutelde archieven"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives">3.8. 7-Zip versleutelde archieven</h2></div></div></div><div class="para">
 		<a href="http://www.7-zip.org/">7-Zip</a> is een, op meerdere platforms beschikbaar en van de volgende generatie, bestandscompressie gereedschap dat ook een sterke versleuteling (AES-256) kan gebruiken om de inhoud van het archief te beschermen. Dit is bijzonder nuttig als je data moet verplaatsen tussen meerdere computers die verschillende operating systemen draaien (b.v. Linux thuis, Windows op het werk) en je zoekt hiervoor naar een overdraagbare versleutelings oplossing.
 	</div><div class="section" title="3.8.1. 7-Zip installatie in Fedora"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Installation">3.8.1. 7-Zip installatie in Fedora</h3></div></div></div><div class="para">
 			7-Zip is niet een standaard geïnstalleerd pakket in Fedora, maar het is beschikbaar in de software repository. Zodra het pakket geïnstalleerd is zal het samen met rest van de software op het systeem vernieuwd worden zonder dat daar speciale aandacht voor nodig is.


Index: sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.2. Volledige schijf versleuteling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="next" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Bestand gebaseerde versleuteling"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Document
 ation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.2. Volledige schijf versleuteling"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption">3.2. Volledige schijf versleuteling</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.2. Volledige schijf versleuteling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="next" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html" title="3.3. Bestand gebaseerde versleuteling"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation 
 Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.2. Volledige schijf versleuteling"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption">3.2. Volledige schijf versleuteling</h2></div></div></div><div class="para">
 			Volledige schijf of partitie versleuteling is een van de beste manieren om je data te beschermen. Niet alleen is elk bestand beschermd, maar ook de tijdelijke opslag die onderdelen van die bestanden kan bevatten is beschermd. Volledige schijf versleuteling zal al je bestanden beschermen zodat je er niet druk over hoeft maken wat je wilt beschermen en mogelijk een bestand vergeet.
 		</div><div class="para">
 			Fedora 9, en later, ondersteunt ingebouwde LUKS versleuteling. LUKS zal je gehele harde schijf partities versleutelen zodat je date beschermd is als de computer uit staat. Dit zal je computer ook beschermen tegen aanvallers die proberen in enkele-gebruikers mode in te loggen op je computer of op een andere manier toegang krijgen.


Index: sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.9.4. Over publieke sleutel versleuteling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"/><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Het maken van GPG sleutels met de commandoregel"/><link rel="next" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Hoofdstuk 4. Algemene principes van informatie beveiliging"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="
 right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.4. Over publieke sleutel versleuteling"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption">3.9.4. Over publieke sleutel versleuteling</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.9.4. Over publieke sleutel versleuteling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"/><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Het maken van GPG sleutels met de commandoregel"/><link rel="next" href="chap-Security_Guide-General_Principles_of_Information_Security.html" title="Hoofdstuk 4. Algemene principes van informatie beveiliging"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right"
  href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-General_Principles_of_Information_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.4. Over publieke sleutel versleuteling"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption">3.9.4. Over publieke sleutel versleuteling</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					<a href="http://en.wikipedia.org/wiki/Public-key_cryptography">Wikipedia - Public Key Cryptography</a>
 				</div></li><li class="listitem"><div class="para">
 					<a href="http://computer.howstuffworks.com/encryption.htm">HowStuffWorks - Encryption</a>


Index: sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.9.3. Het maken van GPG sleutels met de commandoregel</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"/><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Het maken van GPG sleutels in KDE"/><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Over publieke sleutel versleuteling"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href
 ="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.3. Het maken van GPG sleutels met de commandoregel"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE">3.9.3. Het maken van GPG sleutels met de commandoregel</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.9.3. Het maken van GPG sleutels met de commandoregel</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"/><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Het maken van GPG sleutels in KDE"/><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="3.9.4. Over publieke sleutel versleuteling"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http
 ://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.3. Het maken van GPG sleutels met de commandoregel"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE">3.9.3. Het maken van GPG sleutels met de commandoregel</h3></div></div></div><div class="para">
 			Gebruik het volgende shell commando: <code class="code">gpg --gen-key</code>
 		</div><div class="para">
 			Dit commando genereert een sleutelpaar dat bestaat uit een publieke en een privé sleutel. Anderen gebruiken jouw publieke sleutel voor authenticatie en/of ontsleutelen van je communicatie. Verspreid je publieke sleutel zo breed mogelijk, in het bijzonder naar mensen waarvan je weet dat ze autentieke communicatie van jou willen ontvangen, zoals een emaillijst. Het Fedora Documentation Project, bijvoorbeeld, vraagt deelnemers om een publieke GPG sleutel toe te voegen aan hun zelf-introductie.


Index: sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.9.2. Het maken van GPG sleutels in KDE</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"/><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"/><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Het maken van GPG sleutels met de commandoregel"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org
 "><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.2. Het maken van GPG sleutels in KDE"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1">3.9.2. Het maken van GPG sleutels in KDE</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.9.2. Het maken van GPG sleutels in KDE</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"/><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG.html" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"/><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html" title="3.9.3. Het maken van GPG sleutels met de commandoregel"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img
  src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.9.2. Het maken van GPG sleutels in KDE"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1">3.9.2. Het maken van GPG sleutels in KDE</h3></div></div></div><div class="para">
 			Start het KGpg programma van het hoofdmenu door het selecteren van Toepassingen > Hulpmiddelen > KGPG. Als je KGpg nooit eerder gebruikt hebt, begeleidt het programma je door het proces van het aanmaken van je eigen GPG sleutelpaar. Een dialoog venster verschijnt die je vraagt om een nieuwe sleutelpaar te maken. Vul je naam, emailadres, en extra commentaar in. Je kunt ook een verloopdatum voor je sleutel kiezen en de sterkte van de sleutel (het aantal bits) en algorithmes. Het volgende dialoog venster vraagt je naar je wachtzin. Daarna verschijnt je sleutel in het hoofd <code class="code">KGpg</code> venster.
 		</div><div class="warning"><h2>Waarschuwing</h2><div class="para">
 				Als je jouw wachtzin vergeet, kan de sleutel niet gebruikt worden en allee data die versleuteld wordt met die sleutel is verloren.


Index: sect-Security_Guide-Encryption-Using_GPG.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Encryption-Using_GPG.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Encryption-Using_GPG.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Encryption-Using_GPG.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.9. GNU Privacy Guard (GnuPG) gebruiken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Merk op"/><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Het maken van GPG sleutels in KDE"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images
 /image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Encryption-Using_GPG">3.9. GNU Privacy Guard (GnuPG) gebruiken</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.9. GNU Privacy Guard (GnuPG) gebruiken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html" title="3.8.4. Merk op"/><link rel="next" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html" title="3.9.2. Het maken van GPG sleutels in KDE"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image
 _right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives-Things_of_note.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-Using_GPG-Creating_GPG_Keys_in_KDE1.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.9. GNU Privacy Guard (GnuPG) gebruiken"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Encryption-Using_GPG">3.9. GNU Privacy Guard (GnuPG) gebruiken</h2></div></div></div><div class="para">
 		GPG wordt gebruikt om jezelf te identificeren en voor authenticatie van je communicatie, zelfs voor mensen die je niet kent. GPG laat iedereen die een met GPG ondertekende email leest de echtheid hiervan verifiëren. Met andere woorden, GPG laat iemand er behoorlijk zeker van zijn dat de communicatie door jou ondertekent inderdaad van jou komt. GPG is nuttig omdat het helpt te voorkomen dat derden code veranderen of conversaties onderscheppen en de boodschap veranderen.
 	</div><div class="section" title="3.9.1. Het maken van GPG sleutels in GNOME"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Encryption-Using_GPG-Keys_in_GNOME">3.9.1. Het maken van GPG sleutels in GNOME</h3></div></div></div><div class="para">
 			Installeer het Seahorse programma, dat het beheer van GPG sleutels eenvoudiger maakt. Van het hoofdmenu selecteer je <code class="code">Systeem > Beheer > Software toevoegen/verwijderen</code> en wacht tot PackageKit opgestart is. Vul <code class="code">Seahorse</code> in het zoektekstveld en selecteer Find. Selecteer het aanvinkhokje naast het "seahorse" pakket en selecteer "Toepassen" om de software toe te voegen. Je kunt <code class="code">Seahorse</code> ook installeren op de commandoregel met het commando <code class="code">su -c "yum install seahorse"</code>.


Index: sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.3.5. Anticiperen op je toekomstige behoeftes</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD de scanner"/><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"
 ><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.5. Anticiperen op je toekomstige behoeftes"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs">1.2.3.5. Anticiperen op je toekomstige behoeftes</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.3.5. Anticiperen op je toekomstige behoeftes</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD de scanner"/><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html" title="1.3. Aanvallers en kwetsbaarheden"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img 
 src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.5. Anticiperen op je toekomstige behoeftes"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs">1.2.3.5. Anticiperen op je toekomstige behoeftes</h4></div></div></div><div class="para">
 				Afhankelijk van je doel en hulpmiddelen, zijn er veel gereedschappen beschikbaar. Er zijn gereedschappen voor draadloze netwerken, Novell netwerken, Windows systemen, Linux systemen, een nog veel meer. Een ander essentieel onderdeel van het uitvoeren van onderzoeken kan zijn het bekijken van fysieke beveiliging, personeel doorlichten, of voice/PBX netwerk beoordeling. Nieuwe concepten, zoals <em class="firstterm">war walking</em>, wat het scannen van de omtrek van de fysieke structuur van je onderneming inhoudt voor draadloze netwerk kwetsbaarheden, zijn opkomende concepten die je kunt bekijken en, indien nodig, onderdeel maken van je onderzoek. Verbeelding en blootstelling zijn de enigste beperkingen voor het plannen en uitvoeren van kwetsbaarheidsonderzoeken.
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Terug</strong>1.2.3.4. VLAD de scanner</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Volgende</strong>1.3. Aanvallers en kwetsbaarheden</a></li></ul></body></html>
\ No newline at end of file


Index: sect-Security_Guide-Evaluating_the_Tools-Nessus.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Evaluating_the_Tools-Nessus.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Evaluating_the_Tools-Nessus.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Evaluating_the_Tools-Nessus.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.3.2. Nessus</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/ima
 ges/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.2. Nessus"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Evaluating_the_Tools-Nessus">1.2.3.2. Nessus</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.3.2. Nessus</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/im
 age_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.2. Nessus"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Evaluating_the_Tools-Nessus">1.2.3.2. Nessus</h4></div></div></div><div class="para">
 				Nessus is een beveiligings scanner voor alle services. De plug-in architectuur van Nessus staat gebruikers toe het aan te passen voor hun systemen en netwerken. Zoals met elke scanner is Nessus niet beter dan de handtekeningen database waar het op steunt. Gelukkig wordt Nessus regelmatig vernieuwd en biedt het volledige rapportering, en real-time kwetsbaarheid zoeken. Denk er aan dat er verkeerde plussen en verkeerde minnen kunnen zijn, zelfs bij een gereedschap zo krachtig en regelmatig vernieuwd als Nessus.
 			</div><div class="note"><h2>Opmerking</h2><div class="para">
 					The Nessus client and server software is included in Fedora repositories but requires a subscription to use. It has been included in this document as a reference to users who may be interested in using this popular application.


Index: sect-Security_Guide-Evaluating_the_Tools-Nikto.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Evaluating_the_Tools-Nikto.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Evaluating_the_Tools-Nikto.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Evaluating_the_Tools-Nikto.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.3.3. Nikto</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus"/><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD de scanner"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt=
 "Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.3. Nikto"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Evaluating_the_Tools-Nikto">1.2.3.3. Nikto</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.3.3. Nikto</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus"/><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html" title="1.2.3.4. VLAD de scanner"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docum
 entation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.3. Nikto"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Evaluating_the_Tools-Nikto">1.2.3.3. Nikto</h4></div></div></div><div class="para">
 				Nikto een zeer goede common gateway interface (CGI) script scanner. Nikto controleert niet alleen voor CGI kwetsbaarheden maar doet dit op een ontwijkende manier zodat het ontsnapt aan indringings detectie systemen. Het heeft een grondige documentatie die je zorgvuldig moet bekijken voordat je het programma draait. Als je Web servers hebt die CGI scripts aanbieden, kan Nikto een uitstekende hulpbron zijn om de beveiliging van deze servers te controleren.
 			</div><div class="para">
 				Meer informatie over Nikto kan gevonden worden op:


Index: sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html	9 Nov 2009 06:01:40 -0000	1.1
+++ sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.3.4. VLAD de scanner</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto"/><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticiperen op je toekomstige behoeftes"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img sr
 c="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.4. VLAD de scanner"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner">1.2.3.4. VLAD de scanner</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.3.4. VLAD de scanner</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/><link rel="prev" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html" title="1.2.3.3. Nikto"/><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html" title="1.2.3.5. Anticiperen op je toekomstige behoeftes"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Com
 mon_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Evaluating_the_Tools-Nikto.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Anticipating_Your_Future_Needs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3.4. VLAD de scanner"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Evaluating_the_Tools-VLAD_the_Scanner">1.2.3.4. VLAD de scanner</h4></div></div></div><div class="para">
 				VLAD is een kwetsbaarheids scanner, ontwikkelt door het <acronym class="acronym">RAZOR</acronym> team van Bindview, Inc., welke controleert voor de SANS Top Tien lijst van algemene beveiligings problemen (SNMP problemen, bestandsdeling problemen, enz.). Hoewel het niet zo volledig is als Nessus, is VLAD de moeite van het bekijken waard.
 			</div><div class="note"><h2>Opmerking</h2><div class="para">
 					VLAD is geen onderdeel van Fedora en wordt niet ondersteund. Het wordt in dit document genoemd als een referentie voor gebruikers die er interesse in hebben om deze populaire toepassing te gebruiken.


Index: sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.5.3. DMZ's en IPTables</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels"/><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Prerouting"/><link rel="next" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Kwaadwillige software en bedrogen IP adressen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common
 _Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5.3. DMZ's en IPTables"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables">2.8.5.3. DMZ's en IPTables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.5.3. DMZ's en IPTables</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels"/><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Prerouting"/><link rel="next" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Kwaadwillige software en bedrogen IP adressen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Conte
 nt/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5.3. DMZ's en IPTables"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables">2.8.5.3. DMZ's en IPTables</h4></div></div></div><div class="para">
 				Je kunt <code class="command">iptables</code> regels maken om verkeer naar een bepaalde machine, zoals een specifieke HTTP of FTP server, te sturen in een <em class="firstterm">demilitarized zone</em> (<acronym class="acronym">DMZ</acronym>). Een <acronym class="acronym">DMZ</acronym> is een speciaal lokaal subnetwerk bestemd om services op een publieke drager (zoals het Internet) aan te bieden.
 			</div><div class="para">
 				Bijvoorbeeld, om een regel te maken om binnenkomende HTTP verzoeken door te sturen naar een specifieke HTTP server op 10.0.4.2 (buiten de 192.168.1.0/24 reeks van het LAN), gebruikt NAT de <code class="computeroutput">PREROUTING</code> tabel om de pakketten door te sturen naar de juiste bestemming:


Index: sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.5.2. Prerouting</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels"/><link rel="prev" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels"/><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. DMZ's en IPTables"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="D
 ocumentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5.2. Prerouting"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting">2.8.5.2. Prerouting</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.5.2. Prerouting</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels"/><link rel="prev" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels"/><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. DMZ's en IPTables"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documen
 tation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5.2. Prerouting"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting">2.8.5.2. Prerouting</h4></div></div></div><div class="para">
 				Als je een server in je interne netwerk hebt die je extern beschikbaar wilt maken, kun je het <code class="option">-j DNAT</code> doel van de PREROUTING keten in NAT gebruiken om een bestemmings IP adres en poort te specificeren waarnaar binnenkomende pakketten die een verbinding verzoeken naar je interne service geforward kunnen worden.
 			</div><div class="para">
 				Bijvoorbeeld, als je binnenkomende HTTP verzoeken wilt forwarden naar je specifieke Apache HTTP server op 172.31.0.23, gebruik je het volgende commando:


Index: sect-Security_Guide-Firewalls-Additional_Resources.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Firewalls-Additional_Resources.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Firewalls-Additional_Resources.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-Firewalls-Additional_Resources.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.9. Extra hulpbronnen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Nuttige firewall websites"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li 
 class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9. Extra hulpbronnen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-Additional_Resources">2.8.9. Extra hulpbronnen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.9. Extra hulpbronnen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html" title="2.8.9.2. Nuttige firewall websites"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class=
 "previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Firewall_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.9. Extra hulpbronnen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-Additional_Resources">2.8.9. Extra hulpbronnen</h3></div></div></div><div class="para">
 			Er zijn verscheidene aspecten van firewalls en het Linux Netfilter subsysteem die in dit hoofdstuk niet behandeld konden worden. Voor meer informatie refereer je naar de volgende hulpbronnen.
 		</div><div class="section" title="2.8.9.1. geïnstalleerde firewall documentatie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Installed_Firewall_Documentation">2.8.9.1. geïnstalleerde firewall documentatie</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Refereer naar <a class="xref" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables">Paragraaf 2.9, “IPTables”</a> voor meer details over het <code class="command">iptables</code> commando, inclusief definities voor vele commando opties.


Index: sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2. Basis firewall instelling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Het aan- en uitzetten van de firewall"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation S
 ite"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2. Basis firewall instelling"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration">2.8.2. Basis firewall instelling</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.2. Basis firewall instelling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="next" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html" title="2.8.2.2. Het aan- en uitzetten van de firewall"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/>
 </a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Firewall_Configuration-Enabling_and_Disabling_the_Firewall.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.2. Basis firewall instelling"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration">2.8.2. Basis firewall instelling</h3></div></div></div><div class="para">
 			Net zoals een firewall in een gebouw probeert te voorkomen dat het vuur zich verspreidt, probeert een computer firewall te voorkomen dat kwaadwillige software zich verspreidt naar je computer. Het helpt ook om niet gemachtigde gebruikers toegang tot je computer te beletten.
 		</div><div class="para">
 			In een standaard Fedora installatie is er een firewall tussen jouw computer of netwerk en alle niet vertrouwde netwerken, bijvoorbeeld het Internet. Het bepaalt tot welke services op jouw computer gebruikers op afstand toegang kunnen hebben. Een juist ingestelde firewall kan de beveiliging van je systeem sterk verbeteren. Het wordt aanbevolen dat je een firewall instelt voor elk Fedora systeem met een Internet verbinding.


Index: sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.4. Algemene IPTables filtering</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Opslaan en terugzetten van IPTables regels"/><link rel="next" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_ri
 ght.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.4. Algemene IPTables filtering"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-Common_IPTables_Filtering">2.8.4. Algemene IPTables filtering</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.4. Algemene IPTables filtering</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Opslaan en terugzetten van IPTables regels"/><link rel="next" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html" title="2.8.5. FORWARD en NAT regels"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.pn
 g" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.4. Algemene IPTables filtering"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-Common_IPTables_Filtering">2.8.4. Algemene IPTables filtering</h3></div></div></div><div class="para">
 			Een van de belangrijkste aspecten van netwerkbeveiliging is het voorkomen dat aanvallers op afstand toegang krijgen tot een LAN. De integriteit van een LAN moet beschermd worden tegen kwaadwillige gebruikers door het gebruik van strenge firewall regels.
 		</div><div class="para">
 			Met een standaard tactiek om alle binnenkomende, uitgaande, een doorgestuurde pakketten te blokkeren, is het echter onmogelijk voor de firewall/gateway en interne LAN gebruikers om met elkaar of met externe hulpbronnen te communiceren.


Index: sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.5. FORWARD en NAT regels</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Algemene IPTables filtering"/><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Prerouting"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul
  class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5. FORWARD en NAT regels"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.5. FORWARD en NAT regels</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Algemene IPTables filtering"/><link rel="next" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html" title="2.8.5.2. Prerouting"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class
 ="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-FORWARD_and_NAT_Rules-Prerouting.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.5. FORWARD en NAT regels"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-FORWARD_and_NAT_Rules">2.8.5. <code class="computeroutput">FORWARD</code> en <acronym class="acronym">NAT</acronym> regels</h3></div></div></div><div class="para">
 			De meeste ISP's bieden slechts een beperkt aantal publiek bereikbare IP adressen aan de organisaties die ze bedienen.
 		</div><div class="para">
 			Beheerders moeten daarom een alternatieve manier vinden om toegang tot Internet services te delen zonder aan iedere node op het LAN een publiek IP adres te geven.


Index: sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.7. IPTables en verbindingen volgen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Kwaadwillige software en bedrogen IP adressen"/><link rel="next" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentatio
 n Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.7. IPTables en verbindingen volgen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking">2.8.7. IPTables en verbindingen volgen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.7. IPTables en verbindingen volgen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html" title="2.8.6. Kwaadwillige software en bedrogen IP adressen"/><link rel="next" href="sect-Security_Guide-Firewalls-IPv6.html" title="2.8.8. IPv6"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site
 "/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPv6.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.7. IPTables en verbindingen volgen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking">2.8.7. IPTables en verbindingen volgen</h3></div></div></div><div class="para">
 			Je kunt verbindingen naar services inspecteren en beperken gebaseerd op hun <em class="firstterm">verbindingstoestand</em>. Een module binnen <code class="command">iptables</code> gebruikt een methode, <em class="firstterm">verbindingen volgen</em> genaamd, om informatie op te slaan over binnenkomende verbindingen. Je kunt toegang toestaan of weigeren op basis van de volgende verbindingstoestanden:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="option">NEW</code> — Een pakket verzoekt een nieuwe verbinding, zoals een HTTP verzoek.


Index: sect-Security_Guide-Firewalls-IPv6.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Firewalls-IPv6.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Firewalls-IPv6.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-Firewalls-IPv6.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.8. IPv6</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables en verbindingen volgen"/><link rel="next" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul cl
 ass="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.8. IPv6"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-IPv6">2.8.8. IPv6</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.8. IPv6</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables en verbindingen volgen"/><link rel="next" href="sect-Security_Guide-Firewalls-Additional_Resources.html" title="2.8.9. Extra hulpbronnen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="d
 ocnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.8. IPv6"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-IPv6">2.8.8. IPv6</h3></div></div></div><div class="para">
 			De introductie van het volgende generatie Internet protocol met de naam IPv6, gaat boven de 32-bit adres limiet van IPv4 (of IP). IPv6 ondersteunt 128-bit adressen, en vervoersnetwerken die bewust zijn van IPv6 kunnen daarom een groter aantal adressen aan dan IPv4.
 		</div><div class="para">
 			Fedora supports IPv6 firewall rules using the Netfilter 6 subsystem and the <code class="command">ip6tables</code> command. In Fedora 12, both IPv4 and IPv6 services are enabled by default.


Index: sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.6. Kwaadwillige software en bedrogen IP adressen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. DMZ's en IPTables"/><link rel="next" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables en verbindingen volgen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image
 _right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.6. Kwaadwillige software en bedrogen IP adressen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses">2.8.6. Kwaadwillige software en bedrogen IP adressen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.6. Kwaadwillige software en bedrogen IP adressen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html" title="2.8.5.3. DMZ's en IPTables"/><link rel="next" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html" title="2.8.7. IPTables en verbindingen volgen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right
 .png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-IPTables_and_Connection_Tracking.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.6. Kwaadwillige software en bedrogen IP adressen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-Malicious_Software_and_Spoofed_IP_Addresses">2.8.6. Kwaadwillige software en bedrogen IP adressen</h3></div></div></div><div class="para">
 			Uitgebreidere regels kunnen gemaakt worden om toegang te controleren naar specifieke subnetten, of zelfs specifieke nodes, binnen een LAN. Je kunt ook bepaalde verdachte toepassingen of programma's zoals, trojans, wormen, en andere cliënt/server virussen beperken om contact op te nemen met hun server.
 		</div><div class="para">
 			Bijvoorbeeld, sommige trojans scannen netwerken voor services op poorten van 31337 tot 31340 (de <span class="emphasis"><em>elite</em></span> poorten genoemd in krakers terminologie).


Index: sect-Security_Guide-Firewalls-Using_IPTables.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Firewalls-Using_IPTables.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Firewalls-Using_IPTables.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-Firewalls-Using_IPTables.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.3. IPTables gebruiken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Het activeren van de IPTables service"/><link rel="next" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Basis firewall tactieken"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/
 image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3. IPTables gebruiken"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-Using_IPTables">2.8.3. IPTables gebruiken</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.3. IPTables gebruiken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/><link rel="prev" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html" title="2.8.2.6. Het activeren van de IPTables service"/><link rel="next" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Basis firewall tactieken"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_
 right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Firewall_Configuration-Activating_the_IPTables_Service.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3. IPTables gebruiken"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Firewalls-Using_IPTables">2.8.3. IPTables gebruiken</h3></div></div></div><div class="para">
 			De eerste stap voor het gebruik van <code class="command">iptables</code> is om de <code class="command">iptables</code> service te starten. Gebruik het volgende commando om de <code class="command">iptables</code> service te starten:
 		</div><pre class="screen">[root at myServer ~] # service iptables start
 </pre><div class="note"><h2>Opmerking</h2><div class="para">


Index: sect-Security_Guide-Firewalls.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Firewalls.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Firewalls.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-Firewalls.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8. Firewalls</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html" title="2.7.8. Het starten en stoppen van een IPsec verbinding"/><link rel="next" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraprojec
 t.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.8. Firewalls"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Firewalls">2.8. Firewalls</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8. Firewalls</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html" title="2.7.8. Het starten en stoppen van een IPsec verbinding"/><link rel="next" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"
 ><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.8. Firewalls"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Firewalls">2.8. Firewalls</h2></div></div></div><div class="para">
 		Informatie beveiliging wordt meestal beschouwd als een proces en niet als een product. Standaard beveiligings implementaties gebruiken gewoonlijk echter een specifiek mechanisme om de toegangsrechten te controleren en netwerkhulpbronnen te beperken tot gebruikers die gemachtigd, identificeerbaar en traceerbaar zijn. Fedora bevat verscheidene gereedschappen om beheerders en beveiligings ingenieurs te helpen met toegangscontrole zaken op netwerk niveau.
 	</div><div class="para">
 		Firewalls zijn een van de kernonderdelen van een netwerkbeveiligings implementatie. Verscheidene leveranciers brengen firewall oplossingen op de markt die zich richten op alle niveau's van de markt: van thuisgebruikers die een PC beschermen tot datacentrum oplossingen die vitale bedrijfsinformatie beschermen. Firewalls kunnen op zichzelf staande hardware oplossingen zijn, zoals firewall apparaten van Cisco, Nokia, en Sonicwall. Leveranciers zoals Checkpoint, McAfee, en Symantec hebben ook eigendomsmatige software firewall oplossingen ontwikkeld voor thuis en zakelijke markten.


Index: sect-Security_Guide-IPTables-Additional_Resources.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPTables-Additional_Resources.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPTables-Additional_Resources.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPTables-Additional_Resources.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.6. Extra hulpbronnen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.5. IPTables en IPv6"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.6.2. Nuttige IPTables websites"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p>
 <ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.6. Extra hulpbronnen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-IPTables-Additional_Resources">2.9.6. Extra hulpbronnen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.6. Extra hulpbronnen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.5. IPTables en IPv6"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html" title="2.9.6.2. Nuttige IPTables websites"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul cl
 ass="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_IP_Tables_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.6. Extra hulpbronnen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-IPTables-Additional_Resources">2.9.6. Extra hulpbronnen</h3></div></div></div><div class="para">
 			Refereer naar de volgende bronnen voor meer informatie over pakket filtering met <code class="command">iptables</code>.
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<a class="xref" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls">Paragraaf 2.8, “Firewalls”</a> — Bevat een hoofdstuk over de rol van firewalls binnen een algehele beveiligingsstrategie en strategieën voor het maken van firewalls.


Index: sect-Security_Guide-IPTables-Command_Options_for_IPTables.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPTables-Command_Options_for_IPTables.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPTables-Command_Options_for_IPTables.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPTables-Command_Options_for_IPTables.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2. Commando opties voor IPTables</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.2.2. Commando opties"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class
 ="previous"><a accesskey="p" href="sect-Security_Guide-IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2. Commando opties voor IPTables"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-IPTables-Command_Options_for_IPTables">2.9.2. Commando opties voor IPTables</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2. Commando opties voor IPTables</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html" title="2.9.2.2. Commando opties"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="prev
 ious"><a accesskey="p" href="sect-Security_Guide-IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Command_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2. Commando opties voor IPTables"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-IPTables-Command_Options_for_IPTables">2.9.2. Commando opties voor IPTables</h3></div></div></div><div class="para">
 			Regels voor het filteren van pakketten worden gemaakt met behulp van het <code class="command">iptables</code> commando. De volgende aspecten van het pakket worden het meest als criteria:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<span class="emphasis"><em>Pakket type</em></span> — Specificeert het type van de pakketten die het commando filtert.


Index: sect-Security_Guide-IPTables-IPTables_Control_Scripts.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPTables-IPTables_Control_Scripts.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPTables-IPTables_Control_Scripts.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPTables-IPTables_Control_Scripts.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.4. IPTables controle scripts</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.3. Het opslaan van IPTables regels"/><link rel="next" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.5. IPTables en IPv6"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul 
 class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.4. IPTables controle scripts"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-IPTables-IPTables_Control_Scripts">2.9.4. IPTables controle scripts</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.4. IPTables controle scripts</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html" title="2.9.3. Het opslaan van IPTables regels"/><link rel="next" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html" title="2.9.5. IPTables en IPv6"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class=
 "docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-Saving_IPTables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_and_IPv6.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.4. IPTables controle scripts"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-IPTables-IPTables_Control_Scripts">2.9.4. IPTables controle scripts</h3></div></div></div><div class="para">
 			Er zijn twee basis methodes voor het controleren van <code class="command">iptables</code> in Fedora:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<span class="application"><strong>Firewall Configuration Tool</strong></span> (<code class="command">system-config-securitylevel</code>) — Een grafische interface voor het maken, activeren, en opslaan van basis firewall regels. Refereer naar <a class="xref" href="sect-Security_Guide-Firewalls-Basic_Firewall_Configuration.html" title="2.8.2. Basis firewall instelling">Paragraaf 2.8.2, “Basis firewall instelling”</a> voor meer informatie.


Index: sect-Security_Guide-IPTables-IPTables_and_IPv6.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPTables-IPTables_and_IPv6.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPTables-IPTables_and_IPv6.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPTables-IPTables_and_IPv6.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.5. IPTables en IPv6</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.4. IPTables controle scripts"/><link rel="next" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.6. Extra hulpbronnen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="d
 ocnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.5. IPTables en IPv6"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-IPTables-IPTables_and_IPv6">2.9.5. IPTables en IPv6</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.5. IPTables en IPv6</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="prev" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.4. IPTables controle scripts"/><link rel="next" href="sect-Security_Guide-IPTables-Additional_Resources.html" title="2.9.6. Extra hulpbronnen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"
 ><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.5. IPTables en IPv6"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-IPTables-IPTables_and_IPv6">2.9.5. IPTables en IPv6</h3></div></div></div><div class="para">
 			Als het <code class="filename">iptables-ipv6</code> pakket geïnstalleerd is, kan netfilter in Fedora het volgende generatie IPv6 Internet protocol filteren. Het commando dat gebruikt wordt om het IPv6 netfilter te manipuleren is <code class="command">ip6tables</code>.
 		</div><div class="para">
 			De meeste instructies zijn identiek aan degene die gebruikt worden voor <code class="command">iptables</code>, behalve dat de <code class="command">nat</code> nog niet ondersteund wordt. Dit betekent dat het nog niet mogelijk is om IPv6 netwerk adres vertalings taken uit te voeren, zoals vermomming en poort forwarding.


Index: sect-Security_Guide-IPTables-Saving_IPTables_Rules.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPTables-Saving_IPTables_Rules.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPTables-Saving_IPTables_Rules.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPTables-Saving_IPTables_Rules.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.3. Het opslaan van IPTables regels</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.2.6. Lijst opties"/><link rel="next" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.4. IPTables controle scripts"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation 
 Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3. Het opslaan van IPTables regels"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-IPTables-Saving_IPTables_Rules">2.9.3. Het opslaan van IPTables regels</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.3. Het opslaan van IPTables regels</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-IPTables.html" title="2.9. IPTables"/><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html" title="2.9.2.6. Lijst opties"/><link rel="next" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html" title="2.9.4. IPTables controle scripts"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/
 ></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-Listing_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-IPTables_Control_Scripts.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.3. Het opslaan van IPTables regels"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-IPTables-Saving_IPTables_Rules">2.9.3. Het opslaan van IPTables regels</h3></div></div></div><div class="para">
 			Regels die gemaakt worden met het <code class="command">iptables</code> commando worden opgeslagen in het geheugen. Als het systeem opnieuw opgestart wordt voordat de <code class="command">iptables</code> regels opgeslagen worden, gaan alle regels verloren. Om netfilter regels bestand te laten zijn tegen een systeem opstart, moeten ze opgeslagen worden. Om netfilter regels op te slaan, type je het volgende commando als root:
 		</div><pre class="screen"><code class="command"> /sbin/service iptables save </code>
 </pre><div class="para">


Index: sect-Security_Guide-IPTables.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPTables.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPTables.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPTables.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9. IPTables</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Gerelateerde documentatie"/><link rel="next" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_ri
 ght.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.9. IPTables"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-IPTables">2.9. IPTables</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9. IPTables</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html" title="2.8.9.3. Gerelateerde documentatie"/><link rel="next" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html" title="2.9.2. Commando opties voor IPTables"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.pn
 g" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Documentation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables-Command_Options_for_IPTables.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.9. IPTables"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-IPTables">2.9. IPTables</h2></div></div></div><div class="para">
 		Onderdeel van Fedora zijn geavanceerde gereedschappen voor netwerk <em class="firstterm">pakket filtering</em> — het proces van het controleren van netwerkpakketten tijdens het binnenkomen, doorlopen, en verlaten van de netwerkstack in de kernel. Kernel versies voor 2.4 vertrouwden op <code class="command">ipchains</code> voor pakket filtering en gebruikten lijsten met regels toe toegepast werden voor pakketten in iedere stap van het filter proces. De 2.4 kernel introduceerde <code class="command">iptables</code> (ook <em class="firstterm">netfilter</em> genaamd), welke overeenkomt met <code class="command">ipchains</code> maar die het bereik en de controle beschikbaar voor het filteren van netwerk pakketten verder uitbreidt.
 	</div><div class="para">
 		This chapter focuses on packet filtering basics, explains various options available with <code class="command">iptables</code> commands, and explains how filtering rules can be preserved between system reboots.


Index: sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.4.4. Extra overeenkomst optie modules</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.2.4. IPTables overeenkomst opties"/><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.2.4.3. ICMP protocol"/><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.2.5. Doel opties"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><im
 g src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.4.4. Extra overeenkomst optie modules"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules">2.9.2.4.4. Extra overeenkomst optie modules</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.4.4. Extra overeenkomst optie modules</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.2.4. IPTables overeenkomst opties"/><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.2.4.3. ICMP protocol"/><link rel="next" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html" title="2.9.2.5. Doel opties"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src=
 "Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Command_Options_for_IPTables-Target_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.4.4. Extra overeenkomst optie modules"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules">2.9.2.4.4. Extra overeenkomst optie modules</h5></div></div></div><div class="para">
 					Extra overeenkomst opties zijn beschikbaar met modules die geladen worden door het <code class="command">iptables</code> commando.
 				</div><div class="para">
 					Om een overeenkomst optie module te gebruiken, laad je de module bij naam met gebruik van <code class="option">-m <em class="replaceable"><code><module-naam></code></em></code>, waarin <em class="replaceable"><code><module-naam></code></em> de naam van de module is.


Index: sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.4.3. ICMP protocol</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.2.4. IPTables overeenkomst opties"/><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.2.4.2. UDP protocol"/><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.2.4.4. Extra overeenkomst optie modules"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedorapro
 ject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.4.3. ICMP protocol"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol">2.9.2.4.3. ICMP protocol</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.4.3. ICMP protocol</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.2.4. IPTables overeenkomst opties"/><link rel="prev" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html" title="2.9.2.4.2. UDP protocol"/><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html" title="2.9.2.4.4. Extra overeenkomst optie modules"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.o
 rg"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-Additional_Match_Option_Modules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.4.3. ICMP protocol"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol">2.9.2.4.3. ICMP protocol</h5></div></div></div><div class="para">
 					De volgende overeenkomst opties zijn beschikbaar voor het Internet Control Message Protocol (ICMP) (<code class="option">-p icmp</code>):
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="option">--icmp-type</code> — Stelt de naam of het nummer in van het IMCP type die overeen moet komen met de regel. Een lijst van geldige IMCP namen kan verkregen worden door het <code class="command">iptables -p icmp -h</code> commando in te typen.


Index: sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPTables_Match_Options-UDP_Protocol.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.4.2. UDP protocol</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.2.4. IPTables overeenkomst opties"/><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.2.4. IPTables overeenkomst opties"/><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.2.4.3. ICMP protocol"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org
 "><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.4.2. UDP protocol"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol">2.9.2.4.2. UDP protocol</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.9.2.4.2. UDP protocol</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.2.4. IPTables overeenkomst opties"/><link rel="prev" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html" title="2.9.2.4. IPTables overeenkomst opties"/><link rel="next" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html" title="2.9.2.4.3. ICMP protocol"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img
  src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Command_Options_for_IPTables-IPTables_Match_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPTables_Match_Options-ICMP_Protocol.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.9.2.4.2. UDP protocol"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-IPTables_Match_Options-UDP_Protocol">2.9.2.4.2. UDP protocol</h5></div></div></div><div class="para">
 					De volgende overeenkomst opties zijn beschikbaar voor het UDP protocol (<code class="option">-p udp</code>):
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="option">--dport</code> — Specificeert de bestemmingspoort voor het UDP pakket met gebruik van de service naam, poortnummer, of reeks van poortnummers. De <code class="option">--destination-port</code> overeenkomst optie is synoniem met <code class="option">--dport</code>.


Index: sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.6.2. Handmatige IPsec host-naar-host configuratie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. IPsec netwerk-naar-netwerk configuratie"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Co
 mmon_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration">2.7.6.2. Handmatige <abbr class="abbrev">IPsec</abbr> host-naar-host configuratie</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.6.2. Handmatige IPsec host-naar-host configuratie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. IPsec netwerk-naar-netwerk configuratie"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_C
 ontent/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration">2.7.6.2. Handmatige <abbr class="abbrev">IPsec</abbr> host-naar-host configuratie</h4></div></div></div><div class="para">
 				De eerste stap voor het maken van een verbinding is het verzamelen van systeem en netwerk informatie voor ieder werkstation. Voor een host-naar-host verbinding heb je het volgende nodig:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Het IP adres van elke host


Index: sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html	9 Nov 2009 06:01:41 -0000	1.1
+++ sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. IPsec netwerk-naar-netwerk configuratie"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. IPsec netwerk-naar-netwerk configuratie"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html" title="2.7.8. Het starten en stoppen van een IPsec verbinding"/></head><body class="draft "><p id="title"><a class="left" href="h
 ttp://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration">2.7.7.2. Handmatige <abbr class="abbrev">IPsec</abbr> netwerk-naar-netwerk configuratie</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. IPsec netwerk-naar-netwerk configuratie"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html" title="2.7.7. IPsec netwerk-naar-netwerk configuratie"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html" title="2.7.8. Het starten en stoppen van een IPsec verbinding"/></head><body class=""><p id="title"><a class="left" href="http://
 www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration">2.7.7.2. Handmatige <abbr class="abbrev">IPsec</abbr> netwerk-naar-netwerk configuratie</h4></div></div></div><div class="para">
 				Veronderstel dat <acronym class="acronym">LAN</acronym> A (lana.example.com) en <acronym class="acronym">LAN</acronym> B (lanb.example.com) met elkaar verbinden willen via een <abbr class="abbrev">IPsec</abbr> tunnel. Het netwerk adres voor <acronym class="acronym">LAN</acronym> A is in de 192.168.1.0/24 reeks, terwijl <acronym class="acronym">LAN</acronym> B de 192.168.2.0/24 reeks gebruikt. Het gateway IP adres is 192.168.1.254 voor <acronym class="acronym">LAN</acronym> A en 192.168.2.254 voor <acronym class="acronym">LAN</acronym> B. De <abbr class="abbrev">IPsec</abbr> routers zijn apart van iedere <acronym class="acronym">LAN</acronym> gateway en gebruiken twee netwerkapparaten: eth0 is toegekend an een extern toegankelijk statisch IP adres die toegang geeft tot het Internet, terwijl eth1 werkt als een routing punt voor het bewerken en verzenden van <acronym class="acronym">LAN</acronym> pakketten van een netwerk node naar netwerk nodes op afstand.
 			</div><div class="para">
 				De <abbr class="abbrev">IPsec</abbr> verbinding tussen elk netwerk gebruikt een pre-gedeelde sleutel met de waarde <code class="computeroutput">r3dh4tl1nux</code>, en de beheerders van A en B komen overeen om <code class="command">racoon</code> te gebruiken voor het automatisch genereren en delen van authenticatie sleutels tussen elke <abbr class="abbrev">IPsec</abbr> router. De beheerder van <acronym class="acronym">LAN</acronym> A besluit de <abbr class="abbrev">IPsec</abbr> verbinding <code class="computeroutput">ipsec0</code> te noemen, terwijl de beheerder van <acronym class="acronym">LAN</acronym> B de <abbr class="abbrev">IPsec</abbr> verbinding <code class="computeroutput">ipsec1</code> noemt.


Index: sect-Security_Guide-Kerberos-Additional_Resources.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Kerberos-Additional_Resources.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Kerberos-Additional_Resources.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Kerberos-Additional_Resources.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.10. Extra hulpbronnen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Cross gebieds authenticatie instellen"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Nuttige Kerberos websites"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_rig
 ht.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.10. Extra hulpbronnen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Additional_Resources">2.6.10. Extra hulpbronnen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.10. Extra hulpbronnen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Cross gebieds authenticatie instellen"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Nuttige Kerberos websites"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png
 " alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.10. Extra hulpbronnen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Additional_Resources">2.6.10. Extra hulpbronnen</h3></div></div></div><div class="para">
 			Voor meer informatie over Kerberos, refereer je naar de volgende hulpbronnen.
 		</div><div class="section" title="2.6.10.1. Geïnstalleerde Kerberos documentatie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Installed_Kerberos_Documentation">2.6.10.1. Geïnstalleerde Kerberos documentatie</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						De <em class="citetitle">Kerberos V5 Installation Guide</em> en de <em class="citetitle">Kerberos V5 System Administrator's Guide</em> in PostScript en HTML formaten. Deze kunnen gevonden worden in de <code class="filename">/usr/share/doc/krb5-server-<em class="replaceable"><code><versie-nummer></code></em>/</code> map (waarin <em class="replaceable"><code><versie-nummer></code></em> het versie nummer is van het <code class="command">krb5-server</code> pakket geïnstalleerd op je systeem).


Index: sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.6. Het instellen van een Kerberos 5 cliënt</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Het instellen van een Kerberos 5 server"/><link rel="next" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Domein naar gebied afbeelding"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/ima
 ge_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.6. Het instellen van een Kerberos 5 cliënt"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">2.6.6. Het instellen van een Kerberos 5 cliënt</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.6. Het instellen van een Kerberos 5 cliënt</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Het instellen van een Kerberos 5 server"/><link rel="next" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Domein naar gebied afbeelding"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_rig
 ht.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.6. Het instellen van een Kerberos 5 cliënt"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">2.6.6. Het instellen van een Kerberos 5 cliënt</h3></div></div></div><div class="para">
 			Het instellen van een Kerberos 5 cliënt is eenvoudiger dan het instellen van de server. Als een minimum installeer je de cliënt pakketten en geef je iedere cliënt een geldig <code class="filename">krb5.conf</code> configuratie bestand. Terwijl <code class="command">ssh</code> en <code class="command">slogin</code> de voorkeur methodes zijn om in te loggen op cliënt systemen, zijn kerberized versies van <code class="command">rsh</code> en <code class="command">rlogin</code> nog steeds beschikbaar, hoewel het gebruik hiervan vereist dat nog een aantal extra configuratie veranderingen gemaakt worden.
 		</div><div class="procedure"><ol class="1"><li class="step" title="Stap 1"><div class="para">
 					Wees er zeker van dat tijdssynchronisatie aanwezig is tussen de Kerberos cliënt en de KDC. Refereer naar <a class="xref" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Het instellen van een Kerberos 5 server">Paragraaf 2.6.5, “Het instellen van een Kerberos 5 server”</a> voor meer informatie. Verifieer bovendien dat DNS correct werkt op de Kerberos cliënt voordat je de Kerberos cliënt programma's instelt.


Index: sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.5. Het instellen van een Kerberos 5 server</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos en PAM"/><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Het instellen van een Kerberos 5 cliënt"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Do
 cumentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.5. Het instellen van een Kerberos 5 server"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server">2.6.5. Het instellen van een Kerberos 5 server</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.5. Het instellen van een Kerberos 5 server</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos en PAM"/><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Het instellen van een Kerberos 5 cliënt"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Document
 ation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.5. Het instellen van een Kerberos 5 server"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server">2.6.5. Het instellen van een Kerberos 5 server</h3></div></div></div><div class="para">
 			Als Kerberos ingesteld wordt, installeer dan de KDC eerst. Als het nodig is om slaaf servers in te stellen, installeer dan de meester eerst.
 		</div><div class="para">
 			Om de eerste Kerberos KDC in te stellen, volg je deze stappen op:


Index: sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.7. Domein naar gebied afbeelding</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Het instellen van een Kerberos 5 cliënt"/><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Instellen van secundaire KDC's"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_righ
 t.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.7. Domein naar gebied afbeelding"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">2.6.7. Domein naar gebied afbeelding</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.7. Domein naar gebied afbeelding</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html" title="2.6.6. Het instellen van een Kerberos 5 cliënt"/><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Instellen van secundaire KDC's"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png"
  alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.7. Domein naar gebied afbeelding"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">2.6.7. Domein naar gebied afbeelding</h3></div></div></div><div class="para">
 			Als een cliënt probeert om toegang te krijgen tot een service die op een bepaalde server draait, weet het de naam van de service (<span class="emphasis"><em>host</em></span>) en de naam van de server (<span class="emphasis"><em>foo.example.com</em></span>), maar omdat er meer dan een gebieden in je netwerk kunnen zijn, moet het raden naar de naam van het gebied waarin de server zich bevindt.
 		</div><div class="para">
 			Standaard wordt aangenomen dat de naam van het gebied de DNS naam van de server is in hoofdletters.


Index: sect-Security_Guide-Kerberos-How_Kerberos_Works.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Kerberos-How_Kerberos_Works.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Kerberos-How_Kerberos_Works.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Kerberos-How_Kerberos_Works.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.3. Hoe werkt Kerberos</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Kerberos terminologie"/><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos en PAM"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li c
 lass="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.3. Hoe werkt Kerberos"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-How_Kerberos_Works">2.6.3. Hoe werkt Kerberos</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.3. Hoe werkt Kerberos</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Kerberos terminologie"/><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html" title="2.6.4. Kerberos en PAM"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="
 previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.3. Hoe werkt Kerberos"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-How_Kerberos_Works">2.6.3. Hoe werkt Kerberos</h3></div></div></div><div class="para">
 			Kerberos verschilt van de gebruikersnaam/wachtwoord authenticatie methodes. In plaats van het authenticeren van elke gebruiker voor elke netwerk service, gebruikt Kerberos symmetrische versleuteling en een vertrouwde derde partij (een KDC), om gebruikers te authenticeren voor een aantal netwerk services. Als een gebruiker authenticeert naar de KDC, stuurt de KDC een kaartje specifiek voor die sessie terug naar de machine van de gebruiker, en elke service bewust van Kerberos kijkt naar het kaartje op de machine van de gebruiker in plaats van het vragen aan de gebruiker om authentiek verklaard te worden met gebruik van een wachtwoord.
 		</div><div class="para">
 			Als een gebruiker op een netwerk dat zich bewust is van Kerberos inlogt op zijn werkstation, wordt zijn hoofdrolspeler opgestuurd naar de KDC als onderdeel van een verzoek voor een TGT van de Authenticatie server. Dit verzoek kan verstuurd worden het login programma zodat het transparant is voor de gebruiker, of het kan verzonden worden door het <code class="command">kinit</code> programma nadat de gebruiker heeft ingelogd.


Index: sect-Security_Guide-Kerberos-Kerberos_Terminology.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Kerberos-Kerberos_Terminology.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Kerberos-Kerberos_Terminology.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Kerberos-Kerberos_Terminology.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.2. Kerberos terminologie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="next" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Hoe werkt Kerberos"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey
 ="p" href="sect-Security_Guide-Kerberos.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.2. Kerberos terminologie"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Kerberos_Terminology">2.6.2. Kerberos terminologie</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.2. Kerberos terminologie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="next" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Hoe werkt Kerberos"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" h
 ref="sect-Security_Guide-Kerberos.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.2. Kerberos terminologie"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Kerberos_Terminology">2.6.2. Kerberos terminologie</h3></div></div></div><div class="para">
 			Kerberos heeft zijn eigen terminologie om verschillende aspecten van de service te definiëren. Voordat je leert hoe Kerberos werkt, is het belangrijk om de volgende vaktermen te leren.
 		</div><div class="variablelist"><dl><dt><span class="term">authenticatie server (AS)</span></dt><dd><div class="para">
 						Een server die kaartjes uitgeeft voor een gewenste service die op hun beurt gegeven worden aan gebruikers voor toegang tot de service. De AS beantwoordt verzoeken van cliënten die geen legitimatie hebben of niet hebben verstuurd met een verzoek. Het wordt gewoonlijk gebruikt om toegang te krijgen tot de kaartjes uitgevende server (TGS) service door het uitgeven van een kaartjes-gerechtigde kaartje (TGT). De AS draait gewoonlijk op dezelfde host als het sleutel verdelings centrum (KDC).


Index: sect-Security_Guide-Kerberos-Kerberos_and_PAM.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Kerberos-Kerberos_and_PAM.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Kerberos-Kerberos_and_PAM.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Kerberos-Kerberos_and_PAM.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.4. Kerberos en PAM</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Hoe werkt Kerberos"/><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Het instellen van een Kerberos 5 server"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/><
 /a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.4. Kerberos en PAM"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Kerberos_and_PAM">2.6.4. Kerberos en PAM</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.4. Kerberos en PAM</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html" title="2.6.3. Hoe werkt Kerberos"/><link rel="next" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html" title="2.6.5. Het instellen van een Kerberos 5 server"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p
 ><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.4. Kerberos en PAM"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Kerberos_and_PAM">2.6.4. Kerberos en PAM</h3></div></div></div><div class="para">
 			Services die zich bewust zijn van Kerberos maken op dit moment geen gebruik van Pluggable Authentication Modules (PAM) — deze services mijden PAM helemaal. Toepassingen die echter PAM gebruiken kunnen gebruik maken van Kerberos voor authenticatie als de <code class="filename">pam_krb5</code> module (geleverd in het <code class="filename">pam_krb5</code> pakket) geïnstalleerd is. Het <code class="filename">pam_krb5</code> pakket bevat voorbeeld configuratie bestanden die services zoals <code class="command">login</code> en <code class="command">gdm</code> toestaan om gebruikers te authenticeren en ook om initiële legitimatie te verkrijgen met gebruik van hun wachtwoord. Als toegang tot netwerk services altijd wordt uitgevoerd met service die zich bewust zijn van Kerberos of services die GSS-API gebruiken zoals IMAP, kan het netwerk als redelijk veilig beschouwd worden.
 		</div><div class="important"><h2>Belangrijk</h2><div class="para">
 				Beheerders moet er op letten om gebruikers niet toe te staan om authenticatie uit te voeren voor de meeste netwerk services met gebruik van Kerberos wachtwoorden. Vele protocollen versleutelen hun wachtwoorden niet voordat ze over het netwerk verzonden worden, wat de voordelen van het Kerberos systeem vernietigd. Bijvoorbeeld, gebruikers moeten niet toegestaan worden om authenticatie uit te voeren voor Telnet met hetzelfde wachtwoord dat ze voor Kerberos gebruiken.


Index: sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.9. Cross gebieds authenticatie instellen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Instellen van secundaire KDC's"/><link rel="next" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation
  Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.9. Cross gebieds authenticatie instellen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">2.6.9. Cross gebieds authenticatie instellen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.9. Cross gebieds authenticatie instellen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html" title="2.6.8. Instellen van secundaire KDC's"/><link rel="next" href="sect-Security_Guide-Kerberos-Additional_Resources.html" title="2.6.10. Extra hulpbronnen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"
 /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.9. Cross gebieds authenticatie instellen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">2.6.9. Cross gebieds authenticatie instellen</h3></div></div></div><div class="para">
 			<span class="emphasis"><em>Cross-gebieds authenticatie</em></span> is de term die gebruikt wordt voor het beschrijven van situaties waarin cliënten (gewoonlijk gebruikers) van een gebied Kerberos gebruiken voor authenticatie van services (gewoonlijk server processen die draaien op een bepaald server systeem) die behoort tot een ander gebied dan hun eigen.
 		</div><div class="para">
 			In het eenvoudigste geval, om voor een cliënt in een gebied met de naam <code class="literal">A.EXAMPLE.COM</code> toegang te krijgen tot een service in het <code class="literal">B.EXAMPLE.COM</code> gebied, moeten beide gebieden een sleutel delen voor een hoofdrolspeler van de naam <code class="literal">krbtgt/B.EXAMPLE.COM at A.EXAMPLE.COM</code>, en beide sleutels moeten hetzelfde sleutel versie nummer ermee verbonden hebben.


Index: sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.8. Instellen van secundaire KDC's</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Domein naar gebied afbeelding"/><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Cross gebieds authenticatie instellen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_rig
 ht.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.8. Instellen van secundaire KDC's"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">2.6.8. Instellen van secundaire KDC's</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6.8. Instellen van secundaire KDC's</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos"/><link rel="prev" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html" title="2.6.7. Domein naar gebied afbeelding"/><link rel="next" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html" title="2.6.9. Cross gebieds authenticatie instellen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png
 " alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.6.8. Instellen van secundaire KDC's"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">2.6.8. Instellen van secundaire KDC's</h3></div></div></div><div class="para">
 			Om een aantal redenen kun je er voor kiezen om meerdere KDC's te draaien in een bepaald gebied. In dit scenario bewaart een KDC (de <span class="emphasis"><em>meester KDC</em></span>) een schrijfbare kopie van de gebieds database en draait <code class="command">kadmind</code> (het is ook de <span class="emphasis"><em>admin server</em></span> voor jouw gebied), en een of meer KDC's (slaaf KDC's) bewaren alleen-lezen kopieën van de database en draaien <code class="command">kpropd</code>.
 		</div><div class="para">
 			De meester-slaaf overdrachtsprocedure houdt in dat de meester KDC zijn database dumpt in een tijdelijk dump bestand en dat bestand dan overbrengt naar iedere slaaf., welke daarna zijn vorig ontvangen alleen-lezen kopieën van de database overschrijft met de inhoud van het dump bestand.


Index: sect-Security_Guide-Kerberos.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Kerberos.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Kerberos.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Kerberos.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6. Kerberos</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Gerelateerde boeken"/><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Kerberos terminologie"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Si
 te"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.6. Kerberos"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Kerberos">2.6. Kerberos</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.6. Kerberos</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Related_Books.html" title="2.5.5.3. Gerelateerde boeken"/><link rel="next" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html" title="2.6.2. Kerberos terminologie"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/><
 /a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.6. Kerberos"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Kerberos">2.6. Kerberos</h2></div></div></div><div class="para">
 		Systeem beveiliging en integriteit binnen een netwerk kan onhandelbaar zijn. Het kan verschillende beheerders bezighouden om alleen maar in de gaten te houden welke services op een netwerk draaien en hoe deze services gebruikt worden.
 	</div><div class="para">
 		Verder kan de authenticatie van gebruikers voor netwerk services gevaarlijk blijken als de methode gebruikt in het protocol inherent onveilig is, zoals aangetoond wordt door het versturen van onversleutelde wachtwoorden over een netwerk met FTP en Telnet protocollen.


Index: sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.7.5. Interessante verwijzingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Wat heb je zojuist bereikt"/><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedorapro
 ject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.5. Interessante verwijzingen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest">3.7.5. Interessante verwijzingen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.7.5. Interessante verwijzingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Wat heb je zojuist bereikt"/><link rel="next" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html" title="3.8. 7-Zip versleutelde archieven"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.o
 rg"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.5. Interessante verwijzingen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest">3.7.5. Interessante verwijzingen</h3></div></div></div><div class="para">
 			Voor extra informatie over LUKS of het versleutelen van harde schijven met Fedora bezoek je een van de volgende verwijzingen:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<a href="http://clemens.endorphin.org/LUKS/">LUKS - Linux Unified Key Setup</a>


Index: sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.7.3. Stap-voor-stap instructies</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Handmatig mappen versleutelen"/><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Wat heb je zojuist bereikt"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="
 http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.3. Stap-voor-stap instructies"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions">3.7.3. Stap-voor-stap instructies</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.7.3. Stap-voor-stap instructies</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Handmatig mappen versleutelen"/><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html" title="3.7.4. Wat heb je zojuist bereikt"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http:/
 /docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.3. Stap-voor-stap instructies"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions">3.7.3. Stap-voor-stap instructies</h3></div></div></div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					ga naar runlevel 1: <code class="code">telinit 1</code>
 				</div></li><li class="listitem"><div class="para">
 					koppel je bestaande /home af: <code class="code"> umount /home</code>


Index: sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.7.4. Wat heb je zojuist bereikt</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Stap-voor-stap instructies"/><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Interessante verwijzingen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraprojec
 t.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.4. Wat heb je zojuist bereikt"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished">3.7.4. Wat heb je zojuist bereikt</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.7.4. Wat heb je zojuist bereikt</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Stap-voor-stap instructies"/><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html" title="3.7.5. Interessante verwijzingen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"
 ><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.4. Wat heb je zojuist bereikt"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-What_you_have_just_accomplished">3.7.4. Wat heb je zojuist bereikt</h3></div></div></div><div class="para">
 			Gefeliciteerd, je hebt nu een versleutelde partitie waar al je data veilig kan rusten als de computer uit is.
 		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Terug</strong>3.7.3. Stap-voor-stap instructies</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Links_of_Interest.html"><strong>Volgende</strong>3.7.5. Interessante verwijzingen</a></li></ul></body></html>
\ No newline at end of file


Index: sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.7.2. Handmatig mappen versleutelen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Stap-voor-stap instructies"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="
 Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.2. Handmatig mappen versleutelen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories">3.7.2. Handmatig mappen versleutelen</h3></div></div></div><div class="warning"><h2>Waarschuwing</h2><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.7.2. Handmatig mappen versleutelen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/><link rel="prev" href="sect-Security_Guide-LUKS_Disk_Encryption.html" title="3.7. LUKS schijf versleuteling"/><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html" title="3.7.3. Stap-voor-stap instructies"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common
 _Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-LUKS_Disk_Encryption.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories-Step_by_Step_Instructions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="3.7.2. Handmatig mappen versleutelen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories">3.7.2. Handmatig mappen versleutelen</h3></div></div></div><div class="warning"><h2>Waarschuwing</h2><div class="para">
 				Het opvolgen van deze procedure zal alle data verwijderen op de partitie die je gaat versleutelen. Je ZULT al je informatie verliezen! Wees er zeker van dat je een backup maakt van je data naar een externe opslag voordat je met deze procedure begint!
 			</div></div><div class="para">
 			Als je een eerdere versie van Fedora gebruikt dan Fedora 9 en je wilt een partitie versleutelen, of je wilt een partitie versleutelen na de installatie van de huidige versie van Fedora, moet je de volgende instructies gebruiken. Het voorbeeld hieronder laat het versleutelen van je /home partitie zien maar elke partitie kan gebruikt worden.


Index: sect-Security_Guide-LUKS_Disk_Encryption.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-LUKS_Disk_Encryption.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-LUKS_Disk_Encryption.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-LUKS_Disk_Encryption.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.7. LUKS schijf versleuteling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Beveiligde shell"/><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Handmatig mappen versleutelen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" 
 alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.7. LUKS schijf versleuteling"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption">3.7. LUKS schijf versleuteling</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>3.7. LUKS schijf versleuteling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Encryption.html" title="Hoofdstuk 3. Versleuteling"/><link rel="prev" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html" title="3.6. Beveiligde shell"/><link rel="next" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html" title="3.7.2. Handmatig mappen versleutelen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="D
 ocumentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-LUKS_Disk_Encryption-Manually_Encrypting_Directories.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="3.7. LUKS schijf versleuteling"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption">3.7. LUKS schijf versleuteling</h2></div></div></div><div class="para">
 		Linux Unified Key Setup-on-disk-format (of LUKS) staat je toe om partities op je Linux computer te versleutelen. Dit is in het bijzonder belangrijk voor draagbare computers en verwijderbare media. LUKS staat meerdere gebruikerssleutels toe om een meestersleutel te ontsleutelen die daarna gebruikt wordt voor de bulk ontsleuteling van de partitie.
 	</div><div class="section" title="3.7.1. De LUKS implementatie in Fedora"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-LUKS_Disk_Encryption-LUKS_Implementation_in_Fedora">3.7.1. De LUKS implementatie in Fedora</h3></div></div></div><div class="para">
 			Fedora 9, en later, gebruikt LUKS om bestandssysteem versleuteling uit te voeren. Standaard is de optie om het bestandssysteem te versleutelen tijdens de installatie niet aangevinkt. Als je deze optie selecteert om je harde schijf te versleutelen, zal je gevraagd worden naar een wachtzin waarnaar iedere keer als je de computer opstart naar gevraagd zal worden. De wachtzin "opent" de bulk sleutel die wordt gebruikt om je partitie te ontsleutelen. Als je ervoor kiest om de standaard partitietabel te veranderen kun je kiezen welke partities je wilt versleutelen. Dit wordt ingesteld in de instelling van partitietabel.


Index: sect-Security_Guide-Option_Fields-Access_Control.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Option_Fields-Access_Control.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Option_Fields-Access_Control.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Option_Fields-Access_Control.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.2.2.2. Toegangs controle</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden"/><link rel="next" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Shell commando's"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_ri
 ght.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.2. Toegangs controle"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Option_Fields-Access_Control">2.5.2.2.2. Toegangs controle</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.2.2.2. Toegangs controle</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden"/><link rel="next" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Shell commando's"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.pn
 g" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.2. Toegangs controle"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Option_Fields-Access_Control">2.5.2.2.2. Toegangs controle</h5></div></div></div><div class="para">
 					Optie velden staan beheerders ook toe om hosts expliciet toe te staan of te verbieden in een enkele regel door het toevoegen van de <code class="option">allow</code> of <code class="option">deny</code> instructie als de laatste optie.
 				</div><div class="para">
 					Bijvoorbeeld, de volgende twee regels laten SSH verbindingen toe van <code class="systemitem">cliënt-1.example.com</code>, maar verbieden verbindingen van <code class="systemitem">cliënt-2.example.com</code>:


Index: sect-Security_Guide-Option_Fields-Expansions.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Option_Fields-Expansions.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Option_Fields-Expansions.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Option_Fields-Expansions.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.2.2.4. Uitbreidingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden"/><link rel="prev" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Shell commando's"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation 
 Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.4. Uitbreidingen"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Option_Fields-Expansions">2.5.2.2.4. Uitbreidingen</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.2.2.4. Uitbreidingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden"/><link rel="prev" href="sect-Security_Guide-Option_Fields-Shell_Commands.html" title="2.5.2.2.3. Shell commando's"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/
 ></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Shell_Commands.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.4. Uitbreidingen"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Option_Fields-Expansions">2.5.2.2.4. Uitbreidingen</h5></div></div></div><div class="para">
 					Uitbreidingen die tezamen met de <code class="command">spawn</code> en <code class="command">twist</code> instructies gebruikt worden, bieden informatie over de cliënt, server en de betrokken processen.
 				</div><div class="para">
 					De volgende lijst laat de ondersteunde uitbreidingen zien:


Index: sect-Security_Guide-Option_Fields-Shell_Commands.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Option_Fields-Shell_Commands.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Option_Fields-Shell_Commands.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Option_Fields-Shell_Commands.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.2.2.3. Shell commando's</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden"/><link rel="prev" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Toegangs controle"/><link rel="next" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Uitbreidingen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docum
 entation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.3. Shell commando's"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Option_Fields-Shell_Commands">2.5.2.2.3. Shell commando's</h5></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.2.2.3. Shell commando's</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden"/><link rel="prev" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Toegangs controle"/><link rel="next" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Uitbreidingen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentati
 on Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2.3. Shell commando's"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Option_Fields-Shell_Commands">2.5.2.2.3. Shell commando's</h5></div></div></div><div class="para">
 					Optie velden staan toegangs regels toe om shell commando's op te starten met behulp van de volgende twee instructies:
 				</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 							<code class="command">spawn</code> — Start een shell commando op als een child proces. Deze instructie kan taken uitvoeren zoals het gebruiken van <code class="command">/usr/sbin/safe_finger</code> om meer informatie te krijgen over de cliënt die een verbinding vraagt of het maken van speciale log bestanden met gebruik van het <code class="command">echo</code> commando.


Index: sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.3.2. Controle vlag</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat"/><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Module naam"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" h
 ref="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.2. Controle vlag"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag">2.4.3.2. Controle vlag</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.3.2. Controle vlag</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat"/><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Module naam"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="h
 ttp://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.2. Controle vlag"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag">2.4.3.2. Controle vlag</h4></div></div></div><div class="para">
 				Alle PAM modules genereren een succes of een faal resultaat als ze aangeroepen worden. Controle vlaggen vertellen PAM wat met dit resultaat te doen. Modules kunnen op een bepaalde manier gestapeld worden, en de controle vlaggen bepalen hoe belangrijk het succes of falen van een bepaalde module is voor het totale doel voor de authenticatie van de gebruiker voor de service.
 			</div><div class="para">
 				Er zijn vier voorgedefinieerde controle vlaggen:


Index: sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.3.4. Module argementen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat"/><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Module naam"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Voorbeeld PAM configuratie bestanden"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class=
 "right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.4. Module argementen"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments">2.4.3.4. Module argementen</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.3.4. Module argementen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat"/><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html" title="2.4.3.3. Module naam"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Voorbeeld PAM configuratie bestanden"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right
 " href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.4. Module argementen"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments">2.4.3.4. Module argementen</h4></div></div></div><div class="para">
 				PAM gebruikt <em class="firstterm">argumenten</em> om voor sommige modules informatie door te geven aan een inplugbare module tijdens de authenticatie
 			</div><div class="para">
 				Bijvoorbeeld, de <code class="filename">pam_userdb.so</code> module gebruikt informatie die bewaard wordt in een Berkeley DB bestand voor authenticatie van de gebruiker. Berkeley DB is is een open bron database systeem ingebouwd in vele toepassingen. De module neemt een <code class="filename">db</code> argument zodat Berkeley DB weet welke database gebruikt moet worden voor de gevraagde service.


Index: sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-PAM_Configuration_File_Format-Module_Name.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.3.3. Module naam</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat"/><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html" title="2.4.3.2. Controle vlag"/><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Module argementen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.o
 rg"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.3. Module naam"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name">2.4.3.3. Module naam</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.3.3. Module naam</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat"/><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html" title="2.4.3.2. Controle vlag"/><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Module argementen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><i
 mg src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3.3. Module naam"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_Configuration_File_Format-Module_Name">2.4.3.3. Module naam</h4></div></div></div><div class="para">
 				De module naam geeft PAM de naam van de inplugbare module die de opgegeven module interface bevat. In oudere versies van Fedora werd het volledige pad naar de module opgegeven in het PAM configuratie bestand. Echter sinds de komst van <em class="firstterm">multilib</em> systemen, die 64-bit PAM modules in de <code class="filename">/lib64/security/</code> map bewaren, wordt de map naam weggelaten omdat de toepassing gekoppeld is aan de juiste versie van <code class="filename">libpam</code>, welke de locatie van de juiste versie van de module kan bepalen.
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Terug</strong>2.4.3.2. Controle vlag</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Volgende</strong>2.4.3.4. Module argementen</a></li></ul></body></html>
\ No newline at end of file


Index: sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.6.2. Algemene pam_timestamp instructies</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legitimatie opslag"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legitimatie opslag"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.o
 rg"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.6.2. Algemene pam_timestamp instructies"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives">2.4.6.2. Algemene pam_timestamp instructies</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.6.2. Algemene pam_timestamp instructies</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legitimatie opslag"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legitimatie opslag"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><i
 mg src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.6.2. Algemene pam_timestamp instructies"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives">2.4.6.2. Algemene pam_timestamp instructies</h4></div></div></div><div class="para">
 				De <code class="filename">pam_timestamp.so</code> module accepteert verscheidene instructies. De volgende zijn de twee meest gebruikte opties:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="command">timestamp_timeout</code> — Specificeert de periode (in seconden) waarvoor het tijdsstempel geldig is. De standaard waarde is 300 (vijf minuten).


Index: sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.7.2. Toepassing toegang</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" hr
 ef="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.7.2. Toepassing toegang"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access">2.4.7.2. Toepassing toegang</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.7.2. Toepassing toegang</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html" title="2.4.7. PAM en apparaat eigendom"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html" title="2.4.8. Extra hulpbronnen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="ht
 tp://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.7.2. Toepassing toegang"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access">2.4.7.2. Toepassing toegang</h4></div></div></div><div class="para">
 				De console gebruiker heeft ook toegang tot bepaalde programma's ingesteld voor gebruik in de <code class="filename">/etc/security/console.apps/</code> map.
 			</div><div class="para">
 				Deze map bevat configuratie bestanden die de console gebruiker toestaan om bepaalde toepassingen in <code class="filename">/sbin</code> en <code class="filename">/usr/sbin</code> uit te voeren.


Index: sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.8. Extra hulpbronnen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html" title="2.4.7.2. Toepassing toegang"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Nuttige PAM websites"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Commo
 n_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.8. Extra hulpbronnen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">2.4.8. Extra hulpbronnen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.8. Extra hulpbronnen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html" title="2.4.7.2. Toepassing toegang"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Nuttige PAM websites"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Cont
 ent/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.8. Extra hulpbronnen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">2.4.8. Extra hulpbronnen</h3></div></div></div><div class="para">
 			De volgende hulpbronnen leggen meer methodes uit voor het gebruik en instellen van PAM. Naast deze hulpbronnen, lees je ook de PAM configuratie bestanden op het systeem om beter te begrijpen hoe ze opgebouwd zijn.
 		</div><div class="section" title="2.4.8.1. Geïnstalleerde PAM documentatie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Installed_PAM_Documentation">2.4.8.1. Geïnstalleerde PAM documentatie</h4></div></div></div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Aan PAM gerelateerde manual pagina's — Verscheidene manual pagina's bestaan voor verschillende toepassingen en configuratie bestanden betrokken bij PAM. De volgende lijst laat een aantal van de meer belangrijke manual pagina's zien.


Index: sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html	9 Nov 2009 06:01:42 -0000	1.1
+++ sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.5. PAM modules aanmaken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Voorbeeld PAM configuratie bestanden"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legitimatie opslag"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_lef
 t.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.5. PAM modules aanmaken"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">2.4.5. PAM modules aanmaken</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.5. PAM modules aanmaken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html" title="2.4.4. Voorbeeld PAM configuratie bestanden"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html" title="2.4.6. PAM en administratieve legitimatie opslag"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png"
  alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.5. PAM modules aanmaken"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">2.4.5. PAM modules aanmaken</h3></div></div></div><div class="para">
 			Je kunt ten alle tijde nieuwe PAM modules aanmaken of toevoegen voor het gebruik door toepassingen die zich bewust zijn van PAM.
 		</div><div class="para">
 			Bijvoorbeeld, een ontwikkelaar kan een eenmalige-wachtwoord aanmaak methode maken en een PAM module schrijven om het te ondersteunen. Programma's die zich bewust zijn van PAM kunnen deze nieuwe module en wachtwoord methode onmiddellijk gebruiken zonder dat het opnieuw gecompileerd moet worden of anderszins veranderd.


Index: sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html	17 Nov 2009 21:54:43 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.3. PAM configuratie bestand formaat</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html" title="2.4.2. PAM configuratie bestanden"/><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html" title="2.4.3.2. Controle vlag"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.f
 edoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3. PAM configuratie bestand formaat"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">2.4.3. PAM configuratie bestand formaat</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.3. PAM configuratie bestand formaat</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html" title="2.4.2. PAM configuratie bestanden"/><link rel="next" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html" title="2.4.3.2. Controle vlag"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedorap
 roject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_Configuration_File_Format-Control_Flag.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.3. PAM configuratie bestand formaat"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">2.4.3. PAM configuratie bestand formaat</h3></div></div></div><div class="para">
 			Elk PAM configuratie bestand bevat een groep van instructies die als volgt geformatteerd zijn:
 		</div><pre class="screen"><em class="replaceable"><code><module interface></code></em>  <em class="replaceable"><code><controle vlag></code></em>   <em class="replaceable"><code><module naam></code></em>   <em class="replaceable"><code><module argumenten></code></em>
 </pre><div class="para">


Index: sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.2. PAM configuratie bestanden</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right
 " href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.2. PAM configuratie bestanden"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">2.4.2. PAM configuratie bestanden</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.2. PAM configuratie bestanden</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html" title="2.4.3. PAM configuratie bestand formaat"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href
 ="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.2. PAM configuratie bestanden"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">2.4.2. PAM configuratie bestanden</h3></div></div></div><div class="para">
 			De <code class="filename">/etc/pam.d/</code> map bevat de PAM configuratie bestanden voor elke toepassing die zich bewust is van PAM. In eerdere versies van PAM werd het <code class="filename">/etc/pam.conf</code> bestand gebruikt, maar dit bestand is nu verouderd en wordt alleen gebruikt als de <code class="filename">/etc/pam.d/</code> map niet bestaat.
 		</div><div class="section" title="2.4.2.1. PAM service bestanden"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_Configuration_Files-PAM_Service_Files">2.4.2.1. PAM service bestanden</h4></div></div></div><div class="para">
 				Iedere toepassing of <em class="firstterm">service</em> die zich bewust is van PAM heeft een bestand in de <code class="filename">/etc/pam.d/</code> map. Ieder bestand in deze map heeft dezelfde naam als de service waarvoor het de toegang controleert.


Index: sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.6. PAM en administratieve legitimatie opslag</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html" title="2.4.5. PAM modules aanmaken"/><link rel="next" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html" title="2.4.6.2. Algemene pam_timestamp instructies"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Pro
 duct Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.6. PAM en administratieve legitimatie opslag"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching">2.4.6. PAM en administratieve legitimatie opslag</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.6. PAM en administratieve legitimatie opslag</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html" title="2.4.5. PAM modules aanmaken"/><link rel="next" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html" title="2.4.6.2. Algemene pam_timestamp instructies"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product S
 ite"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.6. PAM en administratieve legitimatie opslag"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching">2.4.6. PAM en administratieve legitimatie opslag</h3></div></div></div><div class="para">
 			Een aantal grafische administratieve gereedschappen in Fedora bieden gebruikers voor vijf minuten verhoogde rechten aan met gebruik van de <code class="filename">pam_timestamp.so</code> module. Het is belangrijk om te begrijpen hoe dit mechanisme werkt, omdat een gebruiker die wegloopt van een terminal terwijl <code class="filename">pam_timestamp.so</code> effectief is de machine open laat voor manipulatie voor iedereen met fysieke toegang tot de console.
 		</div><div class="para">
 			In het PAM tijdsstempel schema, vraagt de grafische administratieve toepassing als het het opgestart wordt de gebruiker naar het root wachtwoord. Als de gebruiker gemachtigd is, maakt de <code class="filename">pam_timestamp.so</code> module een tijdsstempel bestand aan. Standaard wordt dit aangemaakt in de <code class="filename">/var/run/sudo/</code> map. Als het tijdsstempel bestand al bestaat, vragen grafische administratieve programma's niet naar een wachtwoord. In plaats daarvan ververst de <code class="filename">pam_timestamp.so</code> module het tijdsstempel bestand, en reserveert een extra vijf minuten van ongehinderde administratieve toegang.


Index: sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.7. PAM en apparaat eigendom</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html" title="2.4.6.2. Algemene pam_timestamp instructies"/><link rel="next" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html" title="2.4.7.2. Toepassing toegang"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right
 " href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.7. PAM en apparaat eigendom"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">2.4.7. PAM en apparaat eigendom</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.7. PAM en apparaat eigendom</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html" title="2.4.6.2. Algemene pam_timestamp instructies"/><link rel="next" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html" title="2.4.7.2. Toepassing toegang"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href
 ="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_and_Administrative_Credential_Caching-Common_pam_timestamp_Directives.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-PAM_and_Device_Ownership-Application_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.7. PAM en apparaat eigendom"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">2.4.7. PAM en apparaat eigendom</h3></div></div></div><div class="para">
 			In Fedora kan de eerste gebruiker die inlogt op de fysieke console van de machine bepaalde apparaten manipuleren en bepaalde taken uitvoeren die normaal voorbehouden zijn aan de root gebruiker. Dit wordt gecontroleerd door een PAM module met de naam <code class="filename">pam_console.so</code>.
 		</div><div class="section" title="2.4.7.1. Apparaat eigendom"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-PAM_and_Device_Ownership-Device_Ownership">2.4.7.1. Apparaat eigendom</h4></div></div></div><div class="para">
 				Als een gebruiker inlogt op een Fedora systeem, wordt de <code class="filename">pam_console.so</code> module aangeroepen door <code class="command">login</code> of de grafische login programma's, <span class="application"><strong>gdm</strong></span>, <span class="application"><strong>kdm</strong></span>, en <span class="application"><strong>xdm</strong></span>. Als deze gebruiker de eerste gebruiker is die inlogt op de fysieke console — waarnaar gerefereerd wordt als de <em class="firstterm">console gebruiker</em> — geeft de module de gebruiker het eigendom van een aantal apparaten die normaal eigendom zijn van root. De console gebruiker heeft deze apparaten in eigendom totdat de laatste sessie van die gebruiker beëindigd wordt. Nadat deze gebruiker uitgelogd is, vervalt het eigendom van de apparaten terug aan de root gebruiker.


Index: sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.4. Voorbeeld PAM configuratie bestanden</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Module argementen"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html" title="2.4.5. PAM modules aanmaken"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://doc
 s.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.4. Voorbeeld PAM configuratie bestanden"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">2.4.4. Voorbeeld PAM configuratie bestanden</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4.4. Voorbeeld PAM configuratie bestanden</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/><link rel="prev" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html" title="2.4.3.4. Module argementen"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html" title="2.4.5. PAM modules aanmaken"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedo
 raproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-PAM_Configuration_File_Format-Module_Arguments.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.4.4. Voorbeeld PAM configuratie bestanden"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">2.4.4. Voorbeeld PAM configuratie bestanden</h3></div></div></div><div class="para">
 			Het volgende is een voorbeeld PAM toepassings configuratie bestand:
 		</div><pre class="screen">#%PAM-1.0
 auth                required  pam_securetty.so


Index: sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4. Pluggable Authentication Modules (PAM)</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" title="2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html" title="2.4.2. PAM configuratie bestanden"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Sit
 e"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.4. Pluggable Authentication Modules (PAM)"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM">2.4. Pluggable Authentication Modules (PAM)</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.4. Pluggable Authentication Modules (PAM)</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" title="2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html" title="2.4.2. PAM configuratie bestanden"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></
 a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.4. Pluggable Authentication Modules (PAM)"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Pluggable_Authentication_Modules_PAM">2.4. Pluggable Authentication Modules (PAM)</h2></div></div></div><div class="para">
 		Programma's die gebruikers toegang geven tot een systeem gebruiken <em class="firstterm">authenticatie</em> om elkaars identiteit te controleren (dat betekent, vast te stellen dat een gebruiker is wie hij zegt te zijn).
 	</div><div class="para">
 		Vroeger had ieder programma zijn eigen manier voor de authenticatie van gebruikers. In Fedora zijn veel programma's ingesteld om een centraal authenticatie mechanisme te gebruiken, <em class="firstterm">Pluggable Authentication Modules</em> (<acronym class="acronym">PAM</acronym>) genaamd


Index: sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>5.2. LUKS partitie versleuteling gebruiken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie"/><link rel="prev" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie"/><link rel="next" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Document
 ation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Secure_Installation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Software_Maintenance.html"><strong>Volgende</strong></a></li></ul><div class="section" title="5.2. LUKS partitie versleuteling gebruiken"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption">5.2. LUKS partitie versleuteling gebruiken</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>5.2. LUKS partitie versleuteling gebruiken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie"/><link rel="prev" href="chap-Security_Guide-Secure_Installation.html" title="Hoofdstuk 5. Veilige installatie"/><link rel="next" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation 
 Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Secure_Installation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Software_Maintenance.html"><strong>Volgende</strong></a></li></ul><div class="section" title="5.2. LUKS partitie versleuteling gebruiken"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption">5.2. LUKS partitie versleuteling gebruiken</h2></div></div></div><div class="para">
 			Sinds Fedora 9 is de implementatie van <a href="http://fedoraproject.org/wiki/Security_Guide/9/LUKSDiskEncryption">Linux Unified Key Setup-on-disk-format</a>(LUKS) versleuteling veel eenvoudiger geworden. Tijdens het installatie proces wordt een optie om de partities te versleutelen aangeboden aan de gebruiker. De gebruiker moet de benodigde wachtzin opgeven wat de sleutel zal zijn om de bulk sleutel te openen die gebruikt zal worden om de data van de partitie te beveiligen.
 		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Secure_Installation.html"><strong>Terug</strong>Hoofdstuk 5. Veilige installatie</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Software_Maintenance.html"><strong>Volgende</strong>Hoofdstuk 6. Software onderhoud</a></li></ul></body></html>
\ No newline at end of file


Index: sect-Security_Guide-Securing_FTP-Anonymous_Access.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_FTP-Anonymous_Access.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_FTP-Anonymous_Access.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_FTP-Anonymous_Access.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.6.2. Anonieme toegang</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen"/><link rel="next" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Gebruikersaccounts"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></
 p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.2. Anonieme toegang"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_FTP-Anonymous_Access">2.2.6.2. Anonieme toegang</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.6.2. Anonieme toegang</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen"/><link rel="next" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Gebruikersaccounts"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul 
 class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.2. Anonieme toegang"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_FTP-Anonymous_Access">2.2.6.2. Anonieme toegang</h4></div></div></div><div class="para">
 				De aanwezigheid van de <code class="filename">/var/ftp/</code> map activeert het anonymous account.
 			</div><div class="para">
 				De eenvoudigste manier om deze map te maken is het installeren van het <code class="filename">vsftpd</code> pakket. Dit pakket zet een mapstructuur op voor anonieme gebruikers en stelt de rechten voor mappen in op alleen-lezen voor anonieme gebruikers.


Index: sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.6.4. Gebruik TCP wrappers om toegang te controleren</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen"/><link rel="prev" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Gebruikersaccounts"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_rig
 ht.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access">2.2.6.4. Gebruik TCP wrappers om toegang te controleren</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.6.4. Gebruik TCP wrappers om toegang te controleren</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen"/><link rel="prev" href="sect-Security_Guide-Securing_FTP-User_Accounts.html" title="2.2.6.3. Gebruikersaccounts"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png
 " alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access">2.2.6.4. Gebruik TCP wrappers om toegang te controleren</h4></div></div></div><div class="para">
 				Gebruik TCP wrappers om toegang tot elke FTP daemon te controleren zoals beschreven in <a class="xref" href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Securing_Services_With_TCP_Wrappers_and_xinetd-Enhancing_Security_With_TCP_Wrappers" title="2.2.1.1. Het verbeteren van beveiliging met TCP wrappers">Paragraaf 2.2.1.1, “Het verbeteren van beveiliging met TCP wrappers”</a>.
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-User_Accounts.html"><strong>Terug</strong>2.2.6.3. Gebruikersaccounts</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Volgende</strong>2.2.7. Sendmail beveiligen</a></li></ul></body></html>
\ No newline at end of file


Index: sect-Security_Guide-Securing_FTP-User_Accounts.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_FTP-User_Accounts.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_FTP-User_Accounts.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_FTP-User_Accounts.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.6.3. Gebruikersaccounts</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen"/><link rel="prev" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Anonieme toegang"/><link rel="next" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/
 images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.3. Gebruikersaccounts"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_FTP-User_Accounts">2.2.6.3. Gebruikersaccounts</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.6.3. Gebruikersaccounts</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen"/><link rel="prev" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Anonieme toegang"/><link rel="next" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images
 /image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6.3. Gebruikersaccounts"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_FTP-User_Accounts">2.2.6.3. Gebruikersaccounts</h4></div></div></div><div class="para">
 				Omdat FTP voor authenticatie onversleutelde gebruikersnamen en wachtwoorden verstuurd over onveilige netwerken, is het een goed idee om systeem gebruikers toegang tot de server vanaf hun gebruikersaccount te verbieden.
 			</div><div class="para">
 				Om alle gebruikersaccount in <code class="command">vsftpd</code> uit te zetten, voeg je de volgende instructie toe aan <code class="filename">/etc/vsftpd/vsftpd.conf</code>:


Index: sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.4.2. Let op syntax fouten</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen"/><link rel="next" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. Gebruik de no_root_squash optie niet"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/imag
 e_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.2. Let op syntax fouten"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors">2.2.4.2. Let op syntax fouten</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.4.2. Let op syntax fouten</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen"/><link rel="next" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. Gebruik de no_root_squash optie niet"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_righ
 t.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.2. Let op syntax fouten"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors">2.2.4.2. Let op syntax fouten</h4></div></div></div><div class="para">
 				De NFS server bepaalt welke bestandssystemen geëxporteerd worden en welke hosts deze mappen moeten exporteren door het raadplegen van het <code class="filename">/etc/exports</code> bestand. Let er op om geen onnodige spaties toe te voegen bij het bewerken van dit bestand.
 			</div><div class="para">
 				Bijvoorbeeld, de volgende regel in het <code class="filename">/etc/exports</code> bestand deelt de map <code class="command">/tmp/nfs/</code> met de host <code class="command">bob.example.com</code> met lees/schrijf rechten.


Index: sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.4.3. Gebruik de no_root_squash optie niet</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen"/><link rel="prev" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Let op syntax fouten"/><link rel="next" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. NFS firewall instelling"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/im
 ages/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.3. Gebruik de no_root_squash optie niet"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option">2.2.4.3. Gebruik de <code class="command">no_root_squash</code> optie niet</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.4.3. Gebruik de no_root_squash optie niet</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen"/><link rel="prev" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Let op syntax fouten"/><link rel="next" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. NFS firewall instelling"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/i
 mage_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.3. Gebruik de no_root_squash optie niet"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option">2.2.4.3. Gebruik de <code class="command">no_root_squash</code> optie niet</h4></div></div></div><div class="para">
 				Standaard veranderen NFS delingen de root gebruiker naar de <code class="command">nfsnobody</code> gebruiker, een gebruikersaccount zonder rechten. Dit verandert de eigenaar van alle door root aangemaakte bestanden naar <code class="command">nfsnobody</code>, wat verhindert dat programma's binnen gehaald worden waarbij de setuid bit gezet is.
 			</div><div class="para">
 				Als <code class="command">no_root_squash</code> wordt gebruikt, zijn root gebruikers op afstand in staat om elk bestand in het gedeelde bestandssysteem te veranderen en toepassingen besmet met een trojaan achter te laten die andere gebruikers onopzettelijk uitvoeren.


Index: sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.4.4. NFS firewall instelling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen"/><link rel="prev" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. Gebruik de no_root_squash optie niet"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. De Apache HTTP server beveiligen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.o
 rg"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.4. NFS firewall instelling"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration">2.2.4.4. NFS firewall instelling</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.4.4. NFS firewall instelling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen"/><link rel="prev" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html" title="2.2.4.3. Gebruik de no_root_squash optie niet"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. De Apache HTTP server beveiligen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><i
 mg src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-Do_Not_Use_the_no_root_squash_Option.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4.4. NFS firewall instelling"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration">2.2.4.4. NFS firewall instelling</h4></div></div></div><div class="para">
 				De voor NFS gebruikte poorten worden dynamisch toegekend door rpcbind, wat problemen kan veroorzaken bij het maken van firewall regels. Om dit proces te vereenvoudigen gebruik je het <span class="emphasis"><em>/etc/sysconfig/nfs</em></span> bestand om op te geven welke poorten gebruikt moeten worden:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						<code class="command">MOUNTD_PORT</code> — TCP en UDP poort voor mountd (rpc.mountd)


Index: sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.3.4. Ken statische poorten toe en gebruik iptables regels</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/><link rel="prev" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Bewerk het /var/yp/securenets bestand"/><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Gebruik Kerberos authenticatie"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="htt
 p://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.4. Ken statische poorten toe en gebruik iptables regels"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules">2.2.3.4. Ken statische poorten toe en gebruik iptables regels</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.3.4. Ken statische poorten toe en gebruik iptables regels</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/><link rel="prev" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Bewerk het /var/yp/securenets bestand"/><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Gebruik Kerberos authenticatie"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://do
 cs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.4. Ken statische poorten toe en gebruik iptables regels"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules">2.2.3.4. Ken statische poorten toe en gebruik iptables regels</h4></div></div></div><div class="para">
 				Alle servers gerelateerd aan NIS kunnen specifieke poorten toegewezen krijgen behalve voor <code class="command">rpc.yppasswdd</code> — de daemon die gebruikers toestaat hun login wachtwoord te veranderen. Poorten toekennen aan de andere twee NIS server daemons, <code class="command">rpc.ypxfrd</code> en <code class="command">ypserv</code>, staat toe om firewall regels te maken om de NIS server daemons verder te beschermen tegen indringers.
 			</div><div class="para">
 				Om dit te doen, voeg je de volgende rgels toe aan <code class="filename">/etc/sysconfig/network</code>:


Index: sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.3.3. Bewerk het /var/yp/securenets bestand</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord"/><link rel="next" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Ken statische poorten toe en gebruik iptables regels"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/ima
 ges/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.3. Bewerk het /var/yp/securenets bestand"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File">2.2.3.3. Bewerk het <code class="filename">/var/yp/securenets</code> bestand</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.3.3. Bewerk het /var/yp/securenets bestand</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord"/><link rel="next" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Ken statische poorten toe en gebruik iptables regels"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/im
 age_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.3. Bewerk het /var/yp/securenets bestand"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File">2.2.3.3. Bewerk het <code class="filename">/var/yp/securenets</code> bestand</h4></div></div></div><div class="para">
 				Als het <code class="filename">/var/yp/securenets</code> bestand leeg is of niet bestaat (zoals het geval is na een standaard installatie), luistert NIS naar alle netwerken. Een van de eerste dingen om te doen is om netmasker/netwerk paren in het bestand te plaatsen zodat <code class="command">ypserv</code> alleen verzoeken van het juiste netwerk beantwoordt.
 			</div><div class="para">
 				Hieronder staat een voorbeeld regel in een <code class="filename">/var/yp/securenets</code> bestand:


Index: sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.3.5. Gebruik Kerberos authenticatie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/><link rel="prev" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Ken statische poorten toe en gebruik iptables regels"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.o
 rg"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.5. Gebruik Kerberos authenticatie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication">2.2.3.5. Gebruik Kerberos authenticatie</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.3.5. Gebruik Kerberos authenticatie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/><link rel="prev" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html" title="2.2.3.4. Ken statische poorten toe en gebruik iptables regels"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NFS.html" title="2.2.4. NFS beveiligen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><i
 mg src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Assign_Static_Ports_and_Use_iptables_Rules.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NFS.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.5. Gebruik Kerberos authenticatie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication">2.2.3.5. Gebruik Kerberos authenticatie</h4></div></div></div><div class="para">
 				Een van de problemen te overwegen als NIS gebruikt wordt voor authenticatie is dat telkens als een gebruiker inlogt op een machine, een wachtwoord hash van de <code class="filename">/etc/shadow</code> map verstuurd wordt over het netwerk. Als een indringer toegang krijgt tot een NIS domein en het netwerkverkeer besnuffelt, kan deze gebruikersnamen en wachtwoord hashes verzamelen. Met genoeg tijd, kan een wachtwoord kraakprogramma zwakke wachtwoorden raden, en een aanvaller kan toegang krijgen tot een geldig account op het netwerk.
 			</div><div class="para">
 				Omdat Kerberos geheime-sleutel versleuteling gebruikt, worden nooit wachtwoord hashes over het netwerk verstuurd, wat het systeem veel veiliger maakt. Refereer naar <a class="xref" href="sect-Security_Guide-Kerberos.html" title="2.6. Kerberos">Paragraaf 2.6, “Kerberos”</a> voor meer informatie over Kerberos.


Index: sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/><link rel="next" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Bewerk het /var/yp/securenets bestand"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs
 .fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname">2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/><link rel="next" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html" title="2.2.3.3. Bewerk het /var/yp/securenets bestand"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedor
 aproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Edit_the_varypsecurenets_File.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname">2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord</h4></div></div></div><div class="para">
 				Elke machine binnen een NIS domein kan commando's gebruiken om informatie te achterhalen van de server zonder authenticatie, mits de gebruiker de DNS hostnaam van de server en de NIS domeinnaam weet.
 			</div><div class="para">
 				Bijvoorbeeld, als iemand of een laptop computer met het netwerk verbindt of van buiten in het netwerk inbreekt (en erin slaagt om een intern IP adres te vervalsen), laat het volgende commando de <code class="command">/etc/passwd</code> map zien:


Index: sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.2.2. Bescherm portmap met iptables</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png"
  alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.2.2. Bescherm portmap met iptables"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables">2.2.2.2. Bescherm portmap met iptables</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.2.2. Bescherm portmap met iptables</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_NIS.html" title="2.2.3. Het beveiligen van NIS"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="
 Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_NIS.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.2.2. Bescherm portmap met iptables"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables">2.2.2.2. Bescherm portmap met iptables</h4></div></div></div><div class="para">
 				Om verdere toegang tot de <code class="command">portmap</code> service te beperken, is het een goed idee om iptables regels toe te voegen aan de server en de toegang te beperken tot specifieke netwerken.
 			</div><div class="para">
 				Hieronder zijn twee voorbeeld iptables commando's. De eerste staat TCP verbindingen toe naar poort 111 (gebruikt door de <code class="command">portmap</code> service) vanaf het 192.168.0.0/24 netwerk. De tweede staat TCP verbindingen toe naar dezelfde poort vanaf de localhost. Dit is nodig voor de <code class="command">sgi_fam</code> service gebruikt door <span class="application"><strong>Nautilus</strong></span>. Alle andere pakketten worden genegeerd.


Index: sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.7.3. Alleen-mail gebruikers</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen"/><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS en Sendmail"/><link rel="next" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Het verifiëren van welke poorten luisteren"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src
 ="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7.3. Alleen-mail gebruikers"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_Sendmail-Mail_only_Users">2.2.7.3. Alleen-mail gebruikers</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.7.3. Alleen-mail gebruikers</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen"/><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS en Sendmail"/><link rel="next" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Het verifiëren van welke poorten luisteren"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Comm
 on_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7.3. Alleen-mail gebruikers"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_Sendmail-Mail_only_Users">2.2.7.3. Alleen-mail gebruikers</h4></div></div></div><div class="para">
 				Om uitbuitingen door lokale gebruikers van de Sendmail server te helpen voorkomen, is het het beste dat mail gebruikers alleen toegang hebben tot de Sendmail server door het gebruik van een email programma. Shell account moeten op de mail server niet toegelaten worden en alle gebruikers in het <code class="filename">/etc/passwd</code> bestand moeten ingesteld worden met <code class="command">/sbin/nologin</code> (met de root gebruiker als mogelijke uitzondering).
 			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Terug</strong>2.2.7.2. NFS en Sendmail</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Volgende</strong>2.2.8. Het verifiëren van welke poorten luisteren</a></li></ul></body></html>
\ No newline at end of file


Index: sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.7.2. NFS en Sendmail</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen"/><link rel="next" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Alleen-mail gebruikers"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" al
 t="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7.2. NFS en Sendmail"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail">2.2.7.2. NFS en Sendmail</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.7.2. NFS en Sendmail</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html" title="2.2.7. Sendmail beveiligen"/><link rel="next" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Alleen-mail gebruikers"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Doc
 umentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_Sendmail.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7.2. NFS en Sendmail"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail">2.2.7.2. NFS en Sendmail</h4></div></div></div><div class="para">
 				Plaats de mail spool map, <code class="filename">/var/spool/mail/</code>, nooit in een NFS gedeelde volume.
 			</div><div class="para">
 				Omdat NFSv2 and NFSv3 geen controle onderhouden van gebruikers en groeps ID's, kunnen twee of meer gebruikers dezelfde UID hebben en kunnen elkaars mail ontvangen en lezen.


Index: sect-Security_Guide-Security_Updates.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Security_Updates.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Security_Updates.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Security_Updates.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.5. Beveiligings vernieuwingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/><link rel="prev" href="sect-Security_Guide-Common_Exploits_and_Attacks.html" title="1.4. Veel voorkomende uitbuitingen en aanvallen"/><link rel="next" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Ondertekende pakketten verifiëren"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common
 _Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.5. Beveiligings vernieuwingen"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Security_Updates">1.5. Beveiligings vernieuwingen</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.5. Beveiligings vernieuwingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/><link rel="prev" href="sect-Security_Guide-Common_Exploits_and_Attacks.html" title="1.4. Veel voorkomende uitbuitingen en aanvallen"/><link rel="next" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Ondertekende pakketten verifiëren"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Conte
 nt/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.5. Beveiligings vernieuwingen"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Security_Updates">1.5. Beveiligings vernieuwingen</h2></div></div></div><div class="para">
 		Als beveiligings kwetsbaarheden ontdekt worden, moet de betreffende software vernieuwd worden om elk potentieel beveiligings risico te beperken. Als de software onderdeel is van een pakket in de Fedora distributie die op dat moment ondersteund wordt, heeft Fedora zich verplicht om zo spoedig mogelijk vernieuwde pakketten vrij te geven die de kwetsbaarheid repareren. Vaak gaan aankondigingen van een bepaalde beveiligings uitbuiting gepaard met een correctie (of bron code die het probleem repareert). Deze correctie wordt dan toegepast in het Fedora pakket, getest, en vrijgegeven als een errata vernieuwing. Als de aankondiging echter geen correctie bevat, werkt een ontwikkelaar eerst samen met de onderhouder van de software om het probleem op te lossen. Zodra het probleem opgelost is, wordt het pakket getest en vrijgegeven als een errata vernieuwing.
 	</div><div class="para">
 		Als een errata vernieuwing wordt vrijgegeven voor software die op je systeem gebruikt wordt, wordt het ten sterkste aanbevolen dat je de betreffende pakketten zo spoedig mogelijk vernieuwt om de tijdsduur dat je systeem potentieel kwetsbaar is te minimaliseren.


Index: sect-Security_Guide-Server_Security-Securing_FTP.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Server_Security-Securing_FTP.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Server_Security-Securing_FTP.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Server_Security-Securing_FTP.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.6. FTP beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. De Apache HTTP server beveiligen"/><link rel="next" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Anonieme toegang"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docu
 mentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6. FTP beveiligen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_FTP">2.2.6. FTP beveiligen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.6. FTP beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html" title="2.2.5. De Apache HTTP server beveiligen"/><link rel="next" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html" title="2.2.6.2. Anonieme toegang"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentat
 ion Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_FTP-Anonymous_Access.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.6. FTP beveiligen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_FTP">2.2.6. FTP beveiligen</h3></div></div></div><div class="para">
 			Het <em class="firstterm">File Transfer Protocol</em> (<abbr class="abbrev">FTP</abbr>) is een ouder TCP protocol ontworpen voor het overbrengen van bestanden over een netwerk. Omdat alle transacties met de server, inclusief gebruikers authenticatie, onversleuteld zijn, wordt het beschouwd als een onveilig protocol en moet het zorgvuldig ingesteld worden.
 		</div><div class="para">
 			Fedora levert drie FTP servers.


Index: sect-Security_Guide-Server_Security-Securing_NFS.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Server_Security-Securing_NFS.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Server_Security-Securing_NFS.html	9 Nov 2009 06:01:43 -0000	1.1
+++ sect-Security_Guide-Server_Security-Securing_NFS.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.4. NFS beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Gebruik Kerberos authenticatie"/><link rel="next" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Let op syntax fouten"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="
 Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4. NFS beveiligen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_NFS">2.2.4. NFS beveiligen</h3></div></div></div><div class="important"><h2>Belangrijk</h2><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.4. NFS beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html" title="2.2.3.5. Gebruik Kerberos authenticatie"/><link rel="next" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html" title="2.2.4.2. Let op syntax fouten"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docume
 ntation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NIS-Use_Kerberos_Authentication.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NFS-Beware_of_Syntax_Errors.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.4. NFS beveiligen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_NFS">2.2.4. NFS beveiligen</h3></div></div></div><div class="important"><h2>Belangrijk</h2><div class="para">
 				De versie van NFS in Fedora, NFSv4, heeft de <code class="command">portmap</code> service niet langer nodig zoals aangegeven is in <a class="xref" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen">Paragraaf 2.2.2, “Portmap beveiligen”</a>. NFS verkeer gebruikt nu TCP in alle versies, in plaats van UDP, en vereist dit als NFSv4 gebruikt wordt. NFSv4 bevat nu Kerberos gebruiker en groep authenticatie, als onderdeel van de <code class="filename">RPCSEC_GSS</code> kernel module. Informatie over <code class="command">portmap</code> wordt nog steeds gegeven, omdat Fedora NFSv2 en NFSv3 ondersteunt, welke beide <code class="command">portmap</code> nog gebruiken.
 			</div></div><div class="section" title="2.2.4.1. Plan het netwerk zorgvuldig"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Securing_NFS-Carefully_Plan_the_Network">2.2.4.1. Plan het netwerk zorgvuldig</h4></div></div></div><div class="para">
 				Nu NFSv4 de mogelijkheid heeft om alle informatie met gebruik van Kerberos versleuteld over een netwerk te versturen, is het belangrijk dat de service correct ingesteld wordt als het achter een firewall of in een verdeeld netwerk is. NFSv2 en NFSv3 geven data nog steeds onveilig door, en dit moet in gedachte worden gehouden. Zorgvuldig netwerk ontwerp in al deze opzichten kunnen beveiligings inbreuken helpen voorkomen.


Index: sect-Security_Guide-Server_Security-Securing_NIS.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Server_Security-Securing_NIS.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Server_Security-Securing_NIS.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Server_Security-Securing_NIS.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.3. Het beveiligen van NIS</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Bescherm portmap met iptables"/><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="h
 ttp://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3. Het beveiligen van NIS"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_NIS">2.2.3. Het beveiligen van NIS</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.3. Het beveiligen van NIS</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Bescherm portmap met iptables"/><link rel="next" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html" title="2.2.3.2. Gebruik een NIS domeinnaan en hostnaam die lijkt op een wachtwoord"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://
 docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_NIS-Use_a_Password_like_NIS_Domain_Name_and_Hostname.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.3. Het beveiligen van NIS"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_NIS">2.2.3. Het beveiligen van NIS</h3></div></div></div><div class="para">
 			Het <em class="firstterm">Network Information Service</em> (<acronym class="acronym">NIS</acronym>) is een RPC service, <code class="command">ypserv</code> genaamd, welke wordt gebruikt in combinatie met <code class="command">portmap</code> en andere gerelateerde services om overzichten van gebruikersnamen, wachtwoorden en andere gevoelige informatie te verspreiden naar elke computer die beweert zich binnen het domein te bevinden.
 		</div><div class="para">
 			Een NIS server wordt opgebouwd met verscheidene toepassingen. Ze omvatten de volgende:


Index: sect-Security_Guide-Server_Security-Securing_Portmap.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Server_Security-Securing_Portmap.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Server_Security-Securing_Portmap.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Server_Security-Securing_Portmap.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.2. Portmap beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="next" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Bescherm portmap met iptables"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site
 "/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.2. Portmap beveiligen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_Portmap">2.2.2. Portmap beveiligen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.2. Portmap beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="next" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html" title="2.2.2.2. Bescherm portmap met iptables"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a
 ></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Portmap-Protect_portmap_With_iptables.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.2. Portmap beveiligen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_Portmap">2.2.2. Portmap beveiligen</h3></div></div></div><div class="para">
 			De <code class="command">portmap</code> service is een dynamische poort toekennings daemon voor RPC services zoals NIS en NFS. Het heeft zwakke authenticatie mechanismes en heeft de mogelijkheid om een brede reeks poorten toe te kennen aan de services die het controleert. Om deze redenen is het moeilijk te beveiligen.
 		</div><div class="note"><h2>Opmerking</h2><div class="para">
 				<code class="command">Portmap</code> beveiligen heeft alleen effect voor NFSv2 en NFSv3 implementaties, omdat NFSv4 het niet langer nodig heeft. Als je van plan bent om een NFSv2 of NFSv3 server te maken, is <code class="command">portmap</code> vereist, en is de volgende paragraaf van toepassing.


Index: sect-Security_Guide-Server_Security-Securing_Sendmail.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Server_Security-Securing_Sendmail.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Server_Security-Securing_Sendmail.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Server_Security-Securing_Sendmail.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.7. Sendmail beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren"/><link rel="next" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS en Sendmail"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/i
 mage_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7. Sendmail beveiligen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_Sendmail">2.2.7. Sendmail beveiligen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.7. Sendmail beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html" title="2.2.6.4. Gebruik TCP wrappers om toegang te controleren"/><link rel="next" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html" title="2.2.7.2. NFS en Sendmail"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_r
 ight.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_FTP-Use_TCP_Wrappers_To_Control_Access.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Securing_Sendmail-NFS_and_Sendmail.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.7. Sendmail beveiligen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_Sendmail">2.2.7. Sendmail beveiligen</h3></div></div></div><div class="para">
 			Sendmail is een Mail Transfer Agent (MTA) die het Simple Mail Transfer Protocol (SMTP) gebruikt om elektronische boodschappen te bezorgen naar andere MTA's en naar email cliënten of afleveringsagenten. Hoewel vele MTA's hun verkeer kunnen versleutelen, doen de meeste dit niet, dus het versturen van email over alle publieke netwerken wordt als een inherent onveilige manier van communicatie beschouwd.
 		</div><div class="para">
 			Het wordt aanbevolen dat iedereen die van plan is een Sendmail server te maken aandacht geeft aan de volgende punten.


Index: sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.5. De Apache HTTP server beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. NFS firewall instelling"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docume
 ntation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.5. De Apache HTTP server beveiligen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">2.2.5. De Apache HTTP server beveiligen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.5. De Apache HTTP server beveiligen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html" title="2.2.4.4. NFS firewall instelling"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_FTP.html" title="2.2.6. FTP beveiligen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentatio
 n Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_NFS-NFS_Firewall_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_FTP.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.5. De Apache HTTP server beveiligen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">2.2.5. De Apache HTTP server beveiligen</h3></div></div></div><div class="para">
 			De Apache HTTP server is een van de meest stabiele en veilige services die meegeleverd worden met Fedora. Een groot aantal opties en technieken zijn beschikbaar om de Apache HTTP server te beveiligen — te veel om ze hier diepgaand te behandelen. De volgende paragraaf legt in het kort goede praktijken uit voor het draaien van de Apache HTTP server.
 		</div><div class="para">
 			Controleer altijd dat alle scripts die op het systeem draaien werken zoals bedoeld is <span class="emphasis"><em>voordat</em></span> je ze in gebruik neemt. Verzeker je er ook van dat alleen de root gebruiker schrijf rechten heeft in alle mappen die scripts of CGI's bevatten. Om dit te doen, voer je de volgende commando's uit als de root gebruiker:


Index: sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.8. Het verifiëren van welke poorten luisteren</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Alleen-mail gebruikers"/><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_r
 ight.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.8. Het verifiëren van welke poorten luisteren"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">2.2.8. Het verifiëren van welke poorten luisteren</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2.8. Het verifiëren van welke poorten luisteren</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Server_Security.html" title="2.2. Server beveiliging"/><link rel="prev" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html" title="2.2.7.3. Alleen-mail gebruikers"/><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.p
 ng" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Securing_Sendmail-Mail_only_Users.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.2.8. Het verifiëren van welke poorten luisteren"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">2.2.8. Het verifiëren van welke poorten luisteren</h3></div></div></div><div class="para">
 			Na het instellen van de netwerk services, is het belangrijk om aandacht te geven naar welke poorten van de interfaces van het netwerk van het systeem feitelijk geluisterd wordt.
 		</div><div class="para">
 			Er zijn twee basis benaderingen voor het opsommen van de poorten die luisteren op het netwerk. De minst betrouwbare benadering is het bevragen van de netwerk status stack met gebruik van commando's zoals <code class="command">netstat -an</code> of <code class="command">lsof -i</code>. Deze methode is minder betrouwbaar omdat deze programma's niet met de machine verbinden vanaf het netwerk, maar in plaats daarvan controleren wat er op de server draait. Om deze reden zijn deze toepassingen vaak doelen voor aanvallers. Crackers proberen hun sporen te verbergen als ze ongeoorloofde poorten openen door het vervangen van <code class="command">netstat</code> en <code class="command">lsof</code> met hun eigen, veranderde versies.


Index: sect-Security_Guide-Server_Security.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Server_Security.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Server_Security.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Server_Security.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2. Server beveiliging</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation
  Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.2. Server beveiliging"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Server_Security">2.2. Server beveiliging</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.2. Server beveiliging</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="next" href="sect-Security_Guide-Server_Security-Securing_Portmap.html" title="2.2.2. Portmap beveiligen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"
 /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security-Securing_Portmap.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.2. Server beveiliging"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Server_Security">2.2. Server beveiliging</h2></div></div></div><div class="para">
 		Als een systeem wordt gebruikt als een server op een publiek netwerk, wordt het een doel voor aanvallen. Het versterken van het systeem en afsluiten van services is daarom van groot belang voor de systeembeheerder.
 	</div><div class="para">
 		Voordat we ingaan op specifieke zaken, bekijken we eerste de volgende algemene aanwijzingen voor het verbeteren van de beveiliging van een server:


Index: sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4. Hoe werkt inloggen met een Smart Card"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="r
 ight" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4. Hoe werkt inloggen met een Smart Card"/><link rel="next" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html" title="2.4. Pluggable Authentication Modules (PAM)"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" 
 href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO</h3></div></div></div><div class="para">
 			Je kunt Firefox instellen om Kerberos te gebruiken voor eenmalig inschrijven. Om dit correct te laten werken, moet je jouw web browser instellen om jouw Kerberos legitimatie naar de juiste <abbr class="abbrev">KDC</abbr> te sturen. De volgende paragraaf beschrijft de configuratie veranderingen en andere vereisten om dit te bereiken.
 		</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					In de adresbalk van Firefox type je <strong class="userinput"><code>about:config</code></strong> om de lijst van de huidige configuratie opties te laten zien.


Index: sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.3.2. Beginnen met je nieuwe Smart Card</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://doc
 s.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.2. Beginnen met je nieuwe Smart Card"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card">2.3.2. Beginnen met je nieuwe Smart Card</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.3.2. Beginnen met je nieuwe Smart Card</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedo
 raproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.2. Beginnen met je nieuwe Smart Card"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card">2.3.2. Beginnen met je nieuwe Smart Card</h3></div></div></div><div class="para">
 			Voordat je jouw smart card kunt gebruiken om in te loggen op je systeem en voordeel te hebben van de verbeterde beveiligings opties die deze technologie biedt, moet je eerst een paar basis installatie en configuratie stappen uitvoeren. Deze zijn hieronder beschreven.
 		</div><div class="note"><h2>Opmerking</h2><div class="para">
 				Deze paragraaf biedt een hoog-niveau overzicht om te beginnen met je smart card. Meer gedetailleerde informatie is beschikbaar in de Red Hat Certificate System Enterprise Security cliënt Guide.


Index: sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Beginnen met je nieuwe Smart Card"/><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4. Hoe werkt inloggen met een Smart Card"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><
 a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Beginnen met je nieuwe Smart Card"/><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html" title="2.3.4. Hoe werkt inloggen met een Smart Card"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a clas
 s="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">2.3.3. Hoe werkt het in gebruik nemen van een Smart Card</h3></div></div></div><div class="para">
 			Smart cards zijn <em class="firstterm">in gebruik genomen</em> als ze een juist certificaat hebben ontvangen die is ondertekend door een geldige Certificaat Authoriteit (<abbr class="abbrev">CA</abbr>). Dit houdt verschillende stappen in, hieronder beschreven:
 		</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					De gebruiker stopt zijn smart card in de smart card lezer van zijn werkstation. Deze actie wordt herkend door de Enterprise Security cliënt (<abbr class="abbrev">ESC</abbr>).


Index: sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.3.4. Hoe werkt inloggen met een Smart Card</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card"/><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" title="2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_l
 eft.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.4. Hoe werkt inloggen met een Smart Card"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">2.3.4. Hoe werkt inloggen met een Smart Card</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.3.4. Hoe werkt inloggen met een Smart Card</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Single_Sign_on_SSO.html" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"/><link rel="prev" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html" title="2.3.3. Hoe werkt het in gebruik nemen van een Smart Card"/><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html" title="2.3.5. Het instellen van Firefox om Kerberos te gebruiken voor SSO"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.pn
 g" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.3.4. Hoe werkt inloggen met een Smart Card"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">2.3.4. Hoe werkt inloggen met een Smart Card</h3></div></div></div><div class="para">
 			Deze paragraaf geeft een kort overzicht van het inloggen met gebruik van een smart card.
 		</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 					als de gebruiker zijn smart card in de smart card lezer stopt, dan wordt deze actie herkend door de PAM faciliteit, die de gebruiker naar zijn PIN vraagt.


Index: sect-Security_Guide-Single_Sign_on_SSO.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Single_Sign_on_SSO.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Single_Sign_on_SSO.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Single_Sign_on_SSO.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.3. Eenmalig inschrijven (Single sign-on - SSO)</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Het verifiëren van welke poorten luisteren"/><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Beginnen met je nieuwe Smart Card"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class
 ="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Single_Sign_on_SSO">2.3. Eenmalig inschrijven (Single sign-on - SSO)</h2></div></div></div><div class="section" title="2.3.1. Inleiding"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.3. Eenmalig inschrijven (Single sign-on - SSO)</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html" title="2.2.8. Het verifiëren van welke poorten luisteren"/><link rel="next" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html" title="2.3.2. Beginnen met je nieuwe Smart Card"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="righ
 t" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.3. Eenmalig inschrijven (Single sign-on - SSO)"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Single_Sign_on_SSO">2.3. Eenmalig inschrijven (Single sign-on - SSO)</h2></div></div></div><div class="section" title="2.3.1. Inleiding"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Single_Sign_on_SSO-Introduction">2.3.1. Inleiding</h3></div></div></div><div class="para">
 			De Fedora SSO functionaliteit reduceert het aantal keren dat Fedora bureaublad gebruikers hun wachtwoord moeten opgeven. Verscheidene belangrijke toepassingen gebruiken hetzelfde onderliggende authenticatie en autorisatie mechanisme zodat gebruikers op Fedora in kunnen loggen met het log-in scherm, en daarna hun wachtwoord niet opnieuw hoeven op te geven. Deze toepassingen worden hieronder beschreven.
 		</div><div class="para">
 			Bovendien kunnen gebruikers inloggen op hun machine zelfs als er geen netwerk is (<em class="firstterm">offline mode</em>) of als de netwerkverbinding onbetrouwbaar is, bijvoorbeeld draadloze toegang. In het laatste geval zullen services elegant afnemen.


Index: sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>6.4. Installeer ondertekende pakketten van goed bekende repositories</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud"/><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Het aanpassen van automatische vernieuwingen"/><link rel="next" href="chap-Security_Guide-References.html" title="Hoofdstuk 7. Referenties"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="ht
 tp://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-References.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.4. Installeer ondertekende pakketten van goed bekende repositories"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories">6.4. Installeer ondertekende pakketten van goed bekende repositories</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>6.4. Installeer ondertekende pakketten van goed bekende repositories</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud"/><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Het aanpassen van automatische vernieuwingen"/><link rel="next" href="chap-Security_Guide-References.html" title="Hoofdstuk 7. Referenties"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://d
 ocs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-References.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.4. Installeer ondertekende pakketten van goed bekende repositories"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories">6.4. Installeer ondertekende pakketten van goed bekende repositories</h2></div></div></div><div class="para">
 			Software pakketten worden verspreid met behulp van repositories. Alle bekende repositories ondersteunen pakket ondertekening. Pakket ondertekening gebruikt publieke sleutel technologie om te bewijzen dat het pakket dat verspreid wordt door de repositorie niet veranderd is nadat de ondertekening was aangebracht. Dit biedt enige bescherming tegen het installeren van software die kwaadwillig veranderd kan zijn nadat het pakket is gemaakt maar voordat jij het downloadt.
 		</div><div class="para">
 			Het gebruiken van te veel repositories, onvertrouwde repositories, of repositories met niet ondertekende pakketten heeft een hoger risico voor het introduceren van kwaadwillige of kwetsbare code op je systeem. Wees voorzichtig als je repositories toevoegt aan yum/software vernieuwing.


Index: sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>6.3. Het aanpassen van automatische vernieuwingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud"/><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen"/><link rel="next" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Installeer ondertekende pakketten van goed bekende repositories"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content
 /images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.3. Het aanpassen van automatische vernieuwingen"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates">6.3. Het aanpassen van automatische vernieuwingen</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>6.3. Het aanpassen van automatische vernieuwingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud"/><link rel="prev" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen"/><link rel="next" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html" title="6.4. Installeer ondertekende pakketten van goed bekende repositories"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/image
 s/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.3. Het aanpassen van automatische vernieuwingen"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates">6.3. Het aanpassen van automatische vernieuwingen</h2></div></div></div><div class="para">
 			Fedora is ingesteld om alle vernieuwingen op een dagelijkse basis toe te passen. Als je wilt veranderen hoe je systeem vernieuwingen installeert moet je dit doen met de '''Software-bijwerkvoorkeuren'''. Je kunt onder andere instellen, het schema, het type vernieuwingen toe te passen of je bericht geven van beschikbare vernieuwingen.
 		</div><div class="para">
 			In Gnome, you can find controls for your updates at: <code class="code">System -> Preferences -> Software Updates</code>. In KDE it is located at: <code class="code">Applications -> Settings -> Software Updates</code>.


Index: sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>6.2. Het plannen en configureren van beveiligingsvernieuwingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud"/><link rel="prev" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud"/><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Het aanpassen van automatische vernieuwingen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="righ
 t" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Software_Maintenance.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates">6.2. Het plannen en configureren van beveiligingsvernieuwingen</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>6.2. Het plannen en configureren van beveiligingsvernieuwingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud"/><link rel="prev" href="chap-Security_Guide-Software_Maintenance.html" title="Hoofdstuk 6. Software onderhoud"/><link rel="next" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html" title="6.3. Het aanpassen van automatische vernieuwingen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" hre
 f="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Software_Maintenance.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html"><strong>Volgende</strong></a></li></ul><div class="section" title="6.2. Het plannen en configureren van beveiligingsvernieuwingen"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates">6.2. Het plannen en configureren van beveiligingsvernieuwingen</h2></div></div></div><div class="para">
 			Alle software bevat fouten. Vaak kunnen deze fouten resulteren in een kwetsbaarheid die je machine blootstelt aan kwaadwillige gebruikers. Niet gecorrigeerde systemen zijn een veel voorkomende oorzaak van computer indringingen. Je moet een plan hebben om beveiligings correcties tijdig aan te brengen om deze kwetsbaarheden te verwijderen zodat ze niet uitgebuit kunnen worden.
 		</div><div class="para">
 			Voor thuis gebruikers, moeten beveiligings correcties zo spoedig mogelijk geïnstalleerd worden. Het instellen van automatische installatie van beveiligings vernieuwingen is een manier om er niet over na te hoeven denken, maar het heeft een klein risico dat iets een conflict met je instelling veroorzaakt of met andere software op je systeem.


Index: sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.2.2. Optie velden</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers"/><link rel="next" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Toegangs controle"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http:
 //docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2. Optie velden"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields">2.5.2.2. Optie velden</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.2.2. Optie velden</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers"/><link rel="next" href="sect-Security_Guide-Option_Fields-Access_Control.html" title="2.5.2.2.2. Toegangs controle"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs
 .fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Option_Fields-Access_Control.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2.2. Optie velden"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields">2.5.2.2. Optie velden</h4></div></div></div><div class="para">
 				Naast de basis regels die toegang toestaan en verbieden ondersteunt de Fedora implementatie van TCO wrappersw ook uitbreidingen in toe toegangs controle taal met behulp van <em class="firstterm">optie velden</em>. Door optie velden in host toegangs regels te gebruiken, kunnen systeembeheerders een groot aantal taken uitvoeren, zoals het veranderen van het log gedrag, de toegangscontrole versterken, en shell commando's opstarten.
 			</div><div class="section" title="2.5.2.2.1. Logging"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Option_Fields-Logging">2.5.2.2.1. Logging</h5></div></div></div><div class="para">
 					Optie velden laten beheerders op eenvoudige manier de log mogelijkheden en het prioriteits niveau van een regel veranderen door de <code class="option">severity</code> instructie te gebruiken.


Index: sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.5. Extra hulpbronnen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" title="2.5.4.3.4. Hulpbronnen beheer opties"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Nuttige TCP wrapper websites"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org
 "><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5. Extra hulpbronnen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources">2.5.5. Extra hulpbronnen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.5. Extra hulpbronnen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/><link rel="prev" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html" title="2.5.4.3.4. Hulpbronnen beheer opties"/><link rel="next" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html" title="2.5.5.2. Nuttige TCP wrapper websites"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img
  src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Resource_Management_Options.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Additional_Resources-Useful_TCP_Wrappers_Websites.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.5. Extra hulpbronnen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources">2.5.5. Extra hulpbronnen</h3></div></div></div><div class="para">
 			Meer informatie over TCP wrappers en <code class="systemitem">xinetd</code> is beschikbaar in de systeem documentatie en op het Internet.
 		</div><div class="section" title="2.5.5.1. Geïnstalleerde TCP wrapper documentatie"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Additional_Resources-Installed_TCP_Wrappers_Documentation">2.5.5.1. Geïnstalleerde TCP wrapper documentatie</h4></div></div></div><div class="para">
 				De documentatie op je systeem is een goede plek om te beginnen voor het zoeken naar extra configuratie opties voor TCP wrappers, <code class="systemitem">xinetd</code>, en toegangs controle.


Index: sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.2. Configuratie bestanden voor TCP wrappers</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right
 .png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2. Configuratie bestanden voor TCP wrappers"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files">2.5.2. Configuratie bestanden voor TCP wrappers</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.2. Configuratie bestanden voor TCP wrappers</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html" title="2.5.2.2. Optie velden"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" 
 alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_Configuration_Files-Option_Fields.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.2. Configuratie bestanden voor TCP wrappers"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files">2.5.2. Configuratie bestanden voor TCP wrappers</h3></div></div></div><div class="para">
 			Om te bepalen of het een cliënt toegestaan is met een service te verbinden, refereren TCP wrappers naar de volgende twee bestanden, gewoonlijk aangegeven als <em class="firstterm">hosts toegangs</em> bestanden:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="filename">/etc/hosts.allow</code>


Index: sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.3. xinetd</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/><link rel="prev" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Uitbreidingen"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docume
 ntation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.3. xinetd"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd">2.5.3. xinetd</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.3. xinetd</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/><link rel="prev" href="sect-Security_Guide-Option_Fields-Expansions.html" title="2.5.2.2.4. Uitbreidingen"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentatio
 n Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Option_Fields-Expansions.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.3. xinetd"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd">2.5.3. xinetd</h3></div></div></div><div class="para">
 			Het <code class="systemitem">xinetd</code> daemon is een met TCP gewrapte <em class="firstterm">super service</em> welke toegang controleert naar een subset van populaire netwerk services, inclusief FTP, IMAP, en Telnet. Het biedt ook service specifieke configuratie opties voor toegangs controle, verbeterde logging, verbinding, omleiding, en hulpbron gebruiks controle.
 		</div><div class="para">
 			Als een cliënt probeert te verbinden met een netwerk service die gecontroleerd wordt door <code class="systemitem">xinetd</code>, ontvangt de super service het verzoek en controleert of er TCP wrapper toegangs regels zijn.


Index: sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4. xinetd configuratie bestanden</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd"/><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. De /etc/xinetd.d/ map"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.pn
 g" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4. xinetd configuratie bestanden"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">2.5.4. xinetd configuratie bestanden</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4. xinetd configuratie bestanden</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html" title="2.5. TCP wrappers en xinetd"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html" title="2.5.3. xinetd"/><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. De /etc/xinetd.d/ map"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt
 ="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4. xinetd configuratie bestanden"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">2.5.4. xinetd configuratie bestanden</h3></div></div></div><div class="para">
 			De cofiguratie bestanden voor <code class="systemitem">xinetd</code> zijn de volgende:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="filename">/etc/xinetd.conf</code> — Het globale <code class="systemitem">xinetd</code> configuratie bestand.


Index: sect-Security_Guide-TCP_Wrappers_and_xinetd.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-TCP_Wrappers_and_xinetd.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-TCP_Wrappers_and_xinetd.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-TCP_Wrappers_and_xinetd.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5. TCP wrappers en xinetd</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Nuttige PAM websites"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><im
 g src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.5. TCP wrappers en xinetd"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-TCP_Wrappers_and_xinetd">2.5. TCP wrappers en xinetd</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5. TCP wrappers en xinetd</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html" title="2.4.8.2. Nuttige PAM websites"/><link rel="next" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html" title="2.5.2. Configuratie bestanden voor TCP wrappers"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src=
 "Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_PAM_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.5. TCP wrappers en xinetd"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-TCP_Wrappers_and_xinetd">2.5. TCP wrappers en xinetd</h2></div></div></div><div class="para">
 		Het controleren van toegang tot netwerk services is een van de belangrijkste beveiligings taken voor de beheerder van een server. Fedora biedt verscheidene gereedschappen voor dit doel. Bijvoorbeeld, een op <code class="command">iptables</code> gebaseerde firewall filtert netwerkpakketten uit die niet welkom zijn in de netwerk stack van de kernel. Voor netwerk services die het gebruiken, voegen <em class="firstterm">TCP Wrappers</em> een extra beschermingslaag toe door het definiëren van welke hosts wel of geen verbinding kunnen maken met "<span class="emphasis"><em>wrapped</em></span>" netwerk services. Een van deze wrapped netwerk services is de <code class="systemitem">xinetd</code> <span class="emphasis"><em>super server</em></span>. Deze server wordt een super server genoemd omdat het de verbindingen controleert van een subset van netwerk services en toegangs controle verder verbetert.
 	</div><div class="para">
 		<a class="xref" href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#figu-Security_Guide-TCP_Wrappers_and_xinetd-Access_Control_to_Network_Services" title="Figuur 2.9. Toegangs controle voor netwerk services">Figuur 2.9, “Toegangs controle voor netwerk services”</a> is een basis afbeelding die laat zien hoe deze gereedschappen samenwerken om netwerk services te beschermen.


Index: sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.3.3. Onoplettend beheer</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging"/><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Niet gecorrigeerde services"/><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Inherent onveilige services"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="rig
 ht" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.3. Onoplettend beheer"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration">1.3.3.3. Onoplettend beheer</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.3.3. Onoplettend beheer</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging"/><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.3.3.2. Niet gecorrigeerde services"/><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.3.3.4. Inherent onveilige services"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" hr
 ef="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.3. Onoplettend beheer"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration">1.3.3.3. Onoplettend beheer</h4></div></div></div><div class="para">
 				Beheerders die nalaten hun systemen te corrigeren zijn een van de grootste bedreigingen van server beveiliging. Volgens het <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), is de belangrijkste oorzaak van computer beveiligings kwetsbaarheid "het aanstellen van niet getrainde mensen voor het onderhouden van beveiliging en het niet aanbieden van training noch de tijd om het mogelijk te maken de taak uit te voeren."<sup>[<a id="d0e957" href="#ftn.d0e957" class="footnote">10</a>]</sup> Dit is zowel van toepassing op onervaren beheerders als voor overmoedige of niet gemotiveerde beheerders.
 			</div><div class="para">
 				Sommige beheerders laten na hun servers en werkstations te corrigeren, terwijl anderen nalaten om de log boodschappen van de systeem kernel of het netwerk verkeer te bekijken. Een andere veel voorkomende fout is het onveranderd laten van standaard wachtwoorden of sleutels voor services. Bijvoorbeeld, sommige databases hebben standaard beheerswachtwoorden omdat de database ontwikkelaars aannemen dat de systeembeheerder deze wachtwoorden onmiddellijk na de installatie zal veranderen. Als een database beheerder nalaat om dit wachtwoord te veranderen, kan zelfs een onervaren cracker het algemeen bekende standaard wachtwoord gebruiken om beheersrechten te krijgen voor de database. Dit zijn slechts een paar voorbeelden van het veroorzaken van in gevaar gebrachte servers door onoplettend beheer.


Index: sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.3.4. Inherent onveilige services</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging"/><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Onoplettend beheer"/><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/ima
 ges/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.4. Inherent onveilige services"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services">1.3.3.4. Inherent onveilige services</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.3.4. Inherent onveilige services</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging"/><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Onoplettend beheer"/><link rel="next" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/im
 age_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.4. Inherent onveilige services"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services">1.3.3.4. Inherent onveilige services</h4></div></div></div><div class="para">
 				Zelfs de meest waakzame organisatie kan het slachtoffer worden van kwetsbaarheden als de netwerk services die ze kiezen inherent onveilig zijn. Bijvoorbeeld, er zijn veel services ontwikkeld met de aanname dat ze gebruikt worden in betrouwbare netwerken; deze aanname vervalt echter zodra de service beschikbaar komt via het Internet — welke zelf inherent onbetrouwbaar is.
 			</div><div class="para">
 				Een categorie van onveilige netwerk sevices zijn degene die niet-versleutelde gebruikersnamen en wachtwoorden vereisen voor authenticatie. Telnet en FTP zijn zulke services. Als pakketsnuffel software het verkeer tussen de gebruiker op afstand en zo'n service volgt, kunnen gebruikersnamen en wachtwoorden eenvoudig onderschept worden.


Index: sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.3.2. Niet gecorrigeerde services</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging"/><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging"/><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Onoplettend beheer"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/><
 /a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.2. Niet gecorrigeerde services"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services">1.3.3.2. Niet gecorrigeerde services</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.3.2. Niet gecorrigeerde services</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging"/><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.3.3. Bedreigingen voor server beveiliging"/><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html" title="1.3.3.3. Onoplettend beheer"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a 
 class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.3.2. Niet gecorrigeerde services"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services">1.3.3.2. Niet gecorrigeerde services</h4></div></div></div><div class="para">
 				De meeste server toepassingen die onderdeel zijn van een standaard installatie zijn solide, goed geteste stukken software. Omdat ze al vele jaren in productie omgevingen gebruikt worden, is hun code grondig verbeterd en veel van de fouten zijn gevonden en gerepareerd.
 			</div><div class="para">
 				Er is echter niet zo iets als perfecte software en er is altijd ruimte voor verdere verbeteringen. Bovendien is nieuwere software meestal niet zo grondig getest als je zou verwachten, om dat het pas kort in productie omgevingen aanwezig is of omdat het misschien niet zo populair is als andere server software.


Index: sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.4.2. Kwetsbare cliënt toepassingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's"/><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's"/><link rel="next" href="sect-Security_Guide-Common_Exploits_and_Attacks.html" title="1.4. Veel voorkomende uitbuitingen en aanvallen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedorapro
 ject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.4.2. Kwetsbare cliënt toepassingen"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications">1.3.4.2. Kwetsbare cliënt toepassingen</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.3.4.2. Kwetsbare cliënt toepassingen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's"/><link rel="prev" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html" title="1.3.4. Bedreigingen voor werkstations en beveiliging van thuis PC's"/><link rel="next" href="sect-Security_Guide-Common_Exploits_and_Attacks.html" title="1.4. Veel voorkomende uitbuitingen en aanvallen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.o
 rg"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Common_Exploits_and_Attacks.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.3.4.2. Kwetsbare cliënt toepassingen"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Threats_to_Workstation_and_Home_PC_Security-Vulnerable_Client_Applications">1.3.4.2. Kwetsbare cliënt toepassingen</h4></div></div></div><div class="para">
 				Als een beheerder een volledig veilige en gecorrigeerde server heeft, betekent dat niet dat gebruikers op afstand veilig zijn wanneer ze er toegang naar krijgen. Bijvoorbeeld, als de server Telnet of FTP services aanbiedt over een publiek netwerk, kan een aanvaller de leesbare tekst gebruikersnamen en wachtwoorden bemachtigen als ze passeren over het netwerk, en daarna de account informatie gebruiken voor toegang naar het werkstation van de gebruiker op afstand.
 			</div><div class="para">
 				Zelfs als veilige protocols gebruikt worden, zoals SSH, kan een gebruiker op afstand kwetsbaar zijn voor bepaalde aanvallen als ze hun cliënt toepassingen niet vernieuwen. Bijvoorbeeld, v.1 SSH cliënten zijn kwetsbaar voor een X-doorsturen aanval van kwaadwillige SSH servers. Zodra er verbonden is met de server, kan de aanvaller op zijn gemak alle toetsaanslagen en muisklikken die de gebruiker maakt onderscheppen over het netwerk. Dit probleem is gerepareerd in het v.2 SSH protocol, maar het is de taak van de gebruiker om bij te houden welke toepassingen zulke kwetsbaarheden hebben en ze te vernieuwen zoals vereist.


Index: sect-Security_Guide-Updating_Packages-Applying_the_Changes.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Updating_Packages-Applying_the_Changes.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Updating_Packages-Applying_the_Changes.html	9 Nov 2009 06:01:44 -0000	1.1
+++ sect-Security_Guide-Updating_Packages-Applying_the_Changes.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.5.4. De veranderingen toepassen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen"/><link rel="prev" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Ondertekende pakketten installeren"/><link rel="next" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image
 _right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.4. De veranderingen toepassen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Updating_Packages-Applying_the_Changes">1.5.4. De veranderingen toepassen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.5.4. De veranderingen toepassen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen"/><link rel="prev" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Ondertekende pakketten installeren"/><link rel="next" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right
 .png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.4. De veranderingen toepassen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Updating_Packages-Applying_the_Changes">1.5.4. De veranderingen toepassen</h3></div></div></div><div class="para">
 			Na het downloaden en installeren van beveiligings errata en vernieuwingen, is het belangrijk om het gebruik van de oudere software te stoppen en te beginnen met het gebruiken van de nieuwe software. Hoe dit gedaan wordt hangt af van het type software dat vernieuwd is. De volgende lijst somt de algemene categorieën van software op en geeft instructies voor het gebruik van de vernieuwde versies na een pakket vernieuwing.
 		</div><div class="note"><h2>Opmerking</h2><div class="para">
 				In het algemeen is het systeem opnieuw opstarten de veiligste manier om te verzekeren dat de laatste versie van een software pakket wordt gebruikt; deze optie is echter niet altijd vereist, of beschikbaar voor de systeembeheerder.


Index: sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html	9 Nov 2009 06:01:45 -0000	1.1
+++ sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.5.3. Ondertekende pakketten installeren</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen"/><link rel="prev" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Ondertekende pakketten verifiëren"/><link rel="next" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. De veranderingen toepassen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Comm
 on_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.3. Ondertekende pakketten installeren"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages">1.5.3. Ondertekende pakketten installeren</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.5.3. Ondertekende pakketten installeren</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen"/><link rel="prev" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html" title="1.5.2. Ondertekende pakketten verifiëren"/><link rel="next" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. De veranderingen toepassen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Con
 tent/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.3. Ondertekende pakketten installeren"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages">1.5.3. Ondertekende pakketten installeren</h3></div></div></div><div class="para">
 			Het installeren van de meeste pakketten kan veilig gedaan worden (behalve voor kernel pakketten) met het volgende commando:
 		</div><pre class="screen"><code class="command">rpm -Uvh /tmp/updates/*.rpm</code>
 </pre><div class="para">


Index: sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html	9 Nov 2009 06:01:45 -0000	1.1
+++ sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.5.2. Ondertekende pakketten verifiëren</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen"/><link rel="prev" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen"/><link rel="next" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Ondertekende pakketten installeren"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image
 _right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Security_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.2. Ondertekende pakketten verifiëren"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages">1.5.2. Ondertekende pakketten verifiëren</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.5.2. Ondertekende pakketten verifiëren</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen"/><link rel="prev" href="sect-Security_Guide-Security_Updates.html" title="1.5. Beveiligings vernieuwingen"/><link rel="next" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html" title="1.5.3. Ondertekende pakketten installeren"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right
 .png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Security_Updates.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.5.2. Ondertekende pakketten verifiëren"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages">1.5.2. Ondertekende pakketten verifiëren</h3></div></div></div><div class="para">
 			Alle Fedora pakketten zijn ondertekend met de Fedora <em class="firstterm">GPG</em> sleutel. GPG staat voor GNU Privacy Guard, of GnuPG, een vrij software pakket voor het verzekeren van authenticiteit van verspreide bestanden. Bijvoorbeeld, een privé sleutel (geheime sleutel) sluit het pakket af terwijl een publieke sleutel het pakket opent en verifieert. Als de publieke sleutel die door Fedora geleverd wordt tijdens de RPM verificatie niet past met de geheime sleutel, kan het pakket veranderd zijn en kan daarom niet vertrouwd worden.
 		</div><div class="para">
 			Het RPM programma in Fedora probeert automatisch de GPG ondertekening van een RPM pakket te verifiëren voordat het geïnstalleerd wordt. Als de Fedora GPG sleutel niet geïnstalleerd is, doe dat dan van een veilige, statische locatie, zoals een Fedora installatie CD-ROM of DVD.


Index: sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html	9 Nov 2009 06:01:45 -0000	1.1
+++ sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.3.2. Basis firewall tactieken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken"/><link rel="prev" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken"/><link rel="next" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Opslaan en terugzetten van IPTables regels"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/
 images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3.2. Basis firewall tactieken"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies">2.8.3.2. Basis firewall tactieken</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.3.2. Basis firewall tactieken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken"/><link rel="prev" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken"/><link rel="next" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html" title="2.8.3.3. Opslaan en terugzetten van IPTables regels"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images
 /image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Firewalls-Using_IPTables.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3.2. Basis firewall tactieken"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies">2.8.3.2. Basis firewall tactieken</h4></div></div></div><div class="para">
 				Het vaststellen van basis firewall tactieken maakt een ondergrond voor het bouwen van meer gedetaileerde, door de gebruiker gedefinieerde regels.
 			</div><div class="para">
 				Elke <code class="command">iptables</code> keten bestaat uit een standaard tactiek, en geen of een aantal regels die samenwerken met de standaard tactiek om het gehele regelstelsel voor de firewall te definiëren.


Index: sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html	9 Nov 2009 06:01:45 -0000	1.1
+++ sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.3.3. Opslaan en terugzetten van IPTables regels</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken"/><link rel="prev" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Basis firewall tactieken"/><link rel="next" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Algemene IPTables filtering"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_
 Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3.3. Opslaan en terugzetten van IPTables regels"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules">2.8.3.3. Opslaan en terugzetten van IPTables regels</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.8.3.3. Opslaan en terugzetten van IPTables regels</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Firewalls-Using_IPTables.html" title="2.8.3. IPTables gebruiken"/><link rel="prev" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html" title="2.8.3.2. Basis firewall tactieken"/><link rel="next" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html" title="2.8.4. Algemene IPTables filtering"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Conten
 t/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Using_IPTables-Basic_Firewall_Policies.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls-Common_IPTables_Filtering.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.8.3.3. Opslaan en terugzetten van IPTables regels"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-Using_IPTables-Saving_and_Restoring_IPTables_Rules">2.8.3.3. Opslaan en terugzetten van IPTables regels</h4></div></div></div><div class="para">
 				Veranderingen in <code class="command">iptables</code> zijn tijdelijk, als het systeem opnieuw opgestart wordt of als de <code class="command">iptables</code> service opnieuw opgestart wordt, worden de regels automatisch verwijderd en de standaarden worden terug gezet. Om de regels te bewaren zodat ze geladen worden als de <code class="command">iptables</code> service gestart wordt, gebruik je het volgende commando:
 			</div><pre class="screen">[root at myServer ~ ] # service iptables save
 </pre><div class="para">


Index: sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html	9 Nov 2009 06:01:45 -0000	1.1
+++ sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.4. Een IPsec verbinding maken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. IPsec installatie"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_
 right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.4. Een IPsec verbinding maken"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.4. Een IPsec verbinding maken</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. IPsec installatie"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.
 png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.4. Een IPsec verbinding maken"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection">2.7.4. Een <abbr class="abbrev">IPsec</abbr> verbinding maken</h3></div></div></div><div class="para">
 			Een <abbr class="abbrev">IPsec</abbr> verbinding is opgedeeld in twee logische fases. In fase 1 initialiseert een <abbr class="abbrev">IPsec</abbr> node de verbinding met de node of het netwerk op afstand. De node of het netwerk op afstand controleert de legitimaties van de aanvragende node en beide partijen onderhandelen over de authenticatie methode voor de verbinding.
 		</div><div class="para">
 			Op Fedora systemen gebruikt een <abbr class="abbrev">IPsec</abbr> verbinding de <em class="firstterm">pre-shared key</em> methode van <abbr class="abbrev">IPsec</abbr> node authenticatie. In een pre-shared key <abbr class="abbrev">IPsec</abbr> verbinding, moeten beide hosts dezelfde sleutel gebruiken om verder te gaan naar fase 2 van de <abbr class="abbrev">IPsec</abbr> verbinding.


Index: sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html	9 Nov 2009 06:01:45 -0000	1.1
+++ sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.3. IPsec</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPN's and Fedora"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Een IPsec verbinding maken"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Cont
 ent/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.3. IPsec"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec">2.7.3. IPsec</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.3. IPsec</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPN's and Fedora"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Een IPsec verbinding maken"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/im
 ages/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.3. IPsec"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec">2.7.3. IPsec</h3></div></div></div><div class="para">
 			Fedora ondersteunt <abbr class="abbrev">IPsec</abbr> voor het verbinden van hosts op afstand naar netwerken met gebruik van een beveiligde tunnel op een gemeenschappelijk dragers netwerk zoals het Internet. <abbr class="abbrev">IPsec</abbr> kan geïmplementeerd worden door gebruik van een host-naar-host (een computer werkstation naar een ander) of netwerk-naar-netwerk (een <acronym class="acronym">LAN</acronym>/<acronym class="acronym">WAN</acronym> naar een ander) configuratie
 		</div><div class="para">
 			De <abbr class="abbrev">IPsec</abbr> implementatie in Fedora gebruikt <em class="firstterm">Internet Key Exchange</em> (<em class="firstterm">IKE</em>), een protocol geïmplementeerd door de Internet Engineering Task Force (<acronym class="acronym">IETF</acronym>), gebruikt voor wederzijdse authenticatie en beveiligde samenwerking tussen verbindende systemen.


Index: sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html	9 Nov 2009 06:01:45 -0000	1.1
+++ sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.6. IPsec host-naar-host configuratie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. IPsec installatie"/><link rel="next" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a clas
 s="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.6. IPsec host-naar-host configuratie"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration">2.7.6. IPsec host-naar-host configuratie</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.6. IPsec host-naar-host configuratie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html" title="2.7.5. IPsec installatie"/><link rel="next" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="rig
 ht" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.6. IPsec host-naar-host configuratie"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration">2.7.6. IPsec host-naar-host configuratie</h3></div></div></div><div class="para">
 			IPsec kan ingesteld worden om een bureaublad of werkstation (host) te verbinden met een andere door het gebruiken van een host-naar-host verbinding. Dit type verbinding gebruikt het netwerk waarmee iedere host verbonden is om een beveiligde tunnel tussen beide hosts te maken. De vereisten voor een host-naar-host verbinding zijn minimaal, evenals de instelling van <abbr class="abbrev">IPsec</abbr> op iedere host. De hosts hebben alleen een specifieke verbinding naar een draag netwerk nodig (zoals het Internet) en Fedora om de <abbr class="abbrev">IPsec</abbr> verbinding te maken.
 		</div><div class="section" title="2.7.6.1. Host-naar-host verbinding"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Host_to_Host_Connection">2.7.6.1. Host-naar-host verbinding</h4></div></div></div><div class="para">
 				Een host-naar-host <abbr class="abbrev">IPsec</abbr> verbinding is een versleutelde verbinding tussen twee systemen, welke beide <abbr class="abbrev">IPsec</abbr> draaien met dezelfde authenticatie sleutel. Als de <abbr class="abbrev">IPsec</abbr> verbinding actief is, wordt alle netwerkverkeer tussen de twee hosts versleuteld.


Index: sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html	9 Nov 2009 06:01:45 -0000	1.1
+++ sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.5. IPsec installatie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Een IPsec verbinding maken"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http
 ://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.5. IPsec installatie"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation">2.7.5. IPsec installatie</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.5. IPsec installatie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html" title="2.7.4. Een IPsec verbinding maken"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html" title="2.7.6. IPsec host-naar-host configuratie"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://doc
 s.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-Creating_an_IPsec_Connection.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Host_to_Host_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.5. IPsec installatie"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Installation">2.7.5. IPsec installatie</h3></div></div></div><div class="para">
 			Het implementeren van <abbr class="abbrev">IPsec</abbr> vereist dat het <code class="filename">ipsec-tools</code> RPM pakket geïnstalleerd wordt op alle <abbr class="abbrev">IPsec</abbr> hosts (als een host-naar-host configuratie gebruikt wordt) of routers (als een netwerk-naar-netwerk configuratie gebruikt wordt). Het RPM pakket bevat essentiele bibliotheken, daemons, en configuratie bestanden voor het instellen van de <abbr class="abbrev">IPsec</abbr> verbinding, inclusief:
 		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 					<code class="command">/sbin/setkey</code> — manipuleert het sleutel beheer en beveiligings attributen van <abbr class="abbrev">IPsec</abbr> in de kernel. Dit programma wordt gecontroleerd door de <code class="command">racoon</code> sleutel beheers daemon. Refereer naar de <code class="command">setkey</code>(8) manual pagina voor meer informatie.


Index: sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html	9 Nov 2009 06:01:45 -0000	1.1
+++ sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.7. IPsec netwerk-naar-netwerk configuratie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie"/><link rel="next" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><i
 mg src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.7. IPsec netwerk-naar-netwerk configuratie"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration">2.7.7. IPsec netwerk-naar-netwerk configuratie</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.7. IPsec netwerk-naar-netwerk configuratie</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html" title="2.7.6.2. Handmatige IPsec host-naar-host configuratie"/><link rel="next" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src
 ="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Host_to_Host_Configuration-Manual_IPsec_Host_to_Host_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.7. IPsec netwerk-naar-netwerk configuratie"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration">2.7.7. IPsec netwerk-naar-netwerk configuratie</h3></div></div></div><div class="para">
 			IPsec kan ook ingesteld worden om een geheel netwerk (zoals een <acronym class="acronym">LAN</acronym> of <acronym class="acronym">WAN</acronym>) te verbinden met een netwerk op afstand met gebruik van een netwerk-naar-netwerk verbinding. Een netwerk-naar-netwerk verbinding vereist het instellen van <abbr class="abbrev">IPsec</abbr> routers aan iedere kant van de verbindende netwerken voor het transparant bewerken en doorgeven van informatie van een node op een <acronym class="acronym">LAN</acronym> naar een node op een <acronym class="acronym">LAN</acronym> op afstand. <a class="xref" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec_Network_to_Network_Configuration.html#figu-Security_Guide-IPsec_Network_to_Network_Configuration-A_network_to_network_IPsec_tunneled_connection" title="Figuur 2.11. Een netwerk-naar-netwerk IPsec verbinding met tunnel">Figuur 2.11, “Een netwerk-naar-netwerk <abbr class="abbrev">IPsec</abbr> verbinding met tunnel”</a> laat ee
 n netwerk-naar-netwerk <abbr class="abbrev">IPsec</abbr> verbinding met tunnel zien.
 		</div><div class="figure" id="figu-Security_Guide-IPsec_Network_to_Network_Configuration-A_network_to_network_IPsec_tunneled_connection"><div class="figure-contents"><div class="mediaobject"><img src="images/n-t-n-ipsec-diagram.png" alt="Een netwerk-naar-netwerk IPsec verbinding met tunnel"/><div class="longdesc"><div class="para">
 						Een netwerk-naar-netwerk <abbr class="abbrev">IPsec</abbr> verbinding met tunnel


Index: sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html	9 Nov 2009 06:01:46 -0000	1.1
+++ sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.8. Het starten en stoppen van een IPsec verbinding</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie"/><link rel="next" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="h
 ttp://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.8. Het starten en stoppen van een IPsec verbinding"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.8. Het starten en stoppen van een IPsec verbinding</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html" title="2.7.7.2. Handmatige IPsec netwerk-naar-netwerk configuratie"/><link rel="next" href="sect-Security_Guide-Firewalls.html" title="2.8. Firewalls"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://
 docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-IPsec_Network_to_Network_Configuration-Manual_IPsec_Network_to_Network_Configuration.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Firewalls.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.8. Het starten en stoppen van een IPsec verbinding"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-Starting_and_Stopping_an_IPsec_Connection">2.7.8. Het starten en stoppen van een <abbr class="abbrev">IPsec</abbr> verbinding</h3></div></div></div><div class="para">
 			Als de <abbr class="abbrev">IPsec</abbr> verbinding niet ingesteld is om op te starten tijdens het opstarten van de computer, kun je het besturen vanaf de commandoregel.
 		</div><div class="para">
 			Om de verbinding te starten, gebruik je het volgende commando voor elke host voor host-naar-host IPsec, of iedere <abbr class="abbrev">IPsec</abbr> router voor netwerk-naar-netwerk IPsec:


Index: sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html	9 Nov 2009 06:01:46 -0000	1.1
+++ sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.2. VPN's and Fedora</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt=
 "Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.2. VPN's and Fedora"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD">2.7.2. VPN's and Fedora</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7.2. VPN's and Fedora</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="prev" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html" title="2.7. Virtuele privé netwerken (VPN's)"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html" title="2.7.3. IPsec"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docum
 entation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.7.2. VPN's and Fedora"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD">2.7.2. VPN's and Fedora</h3></div></div></div><div class="para">
 			Fedora biedt verschillende opties wat betreft de implementatie van software oplossingen voor een beveiligde verbinding naar een <acronym class="acronym">WAN</acronym>. <em class="firstterm">Internet Protocol Security</em> (<acronym class="acronym">IPsec</acronym>) is de ondersteunde <abbr class="abbrev">VPN</abbr> implementatie voor Fedora, en voldoet in voldoende mate aan de gebruikersbehoeften van bedrijven met buitenkantoren of gebruikers op afstand.
 		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Virtual_Private_Networks_VPNs.html"><strong>Terug</strong>2.7. Virtuele privé netwerken (VPN's)</a></li><li class="up"><a accesskey="u" href="#"><strong>Omhoog</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Begin</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-IPsec.html"><strong>Volgende</strong>2.7.3. IPsec</a></li></ul></body></html>
\ No newline at end of file


Index: sect-Security_Guide-Virtual_Private_Networks_VPNs.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Virtual_Private_Networks_VPNs.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Virtual_Private_Networks_VPNs.html	9 Nov 2009 06:01:46 -0000	1.1
+++ sect-Security_Guide-Virtual_Private_Networks_VPNs.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7. Virtuele privé netwerken (VPN's)</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Nuttige Kerberos websites"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPN's and Fedora"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_C
 ontent/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.7. Virtuele privé netwerken (VPN's)"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs">2.7. Virtuele privé netwerken (VPN's)</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.7. Virtuele privé netwerken (VPN's)</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Securing_Your_Network.html" title="Hoofdstuk 2. Je netwerk beveiligen"/><link rel="prev" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html" title="2.6.10.2. Nuttige Kerberos websites"/><link rel="next" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html" title="2.7.2. VPN's and Fedora"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content
 /images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Useful_Kerberos_Websites.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Virtual_Private_Networks_VPNs-VPNs_and_PROD.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="2.7. Virtuele privé netwerken (VPN's)"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Virtual_Private_Networks_VPNs">2.7. Virtuele privé netwerken (VPN's)</h2></div></div></div><div class="para">
 		Bedrijven met verscheidene satelliet kantoren verbinden vaak met elkaar met specifieke lijnen voor effectiviteit en bescherming van gevoelige data tijdens de overdracht. Bijvoorbeeld, veel bedrijven gebruiken frame relay of <em class="firstterm">Asynchronous Transfer Mode</em> (<acronym class="acronym">ATM</acronym>) lijnen voor een eindpunt-naar-eindpunt oplossing om een kantoor met andere te verbinden. Dit kan een duur voorstel zijn, in het bijzonder voor bedrijven van gemiddelde grootte (<acronym class="acronym">SMB</acronym>'s) die uit willen breiden zonder de hoge kosten te betalen die behoren bij specifieke digitale circuits voor grote ondernemingen.
 	</div><div class="para">
 		Om aan deze behoeft te voldoen, werden <em class="firstterm">Virtuele privé netwerken</em> (<abbr class="abbrev">VPN</abbr>'s) ontwikkeld. Door het opvolgen van dezelfde functionele principes als specifieke circuits, staan <abbr class="abbrev">VPN</abbr>'s beveiligde digitale communicatie toe tussen twee partijen (of netwerken), waarmee een <em class="firstterm">Wide Area Network</em> (<acronym class="acronym">WAN</acronym>) gemaakt wordt van bestaande <em class="firstterm">Local Area Networks</em> (<acronym class="acronym">LAN</acronym>'s). Waarin het verschilt van frame relay of ATM is het transport medium. <abbr class="abbrev">VPN</abbr>'s verzenden over IP met gebruik van datagrams als de transport laag, wat het een veilig kanaal door het Internet maakt naar een bedoelde bestemming. De meeste vrije <abbr class="abbrev">VPN</abbr> implementaties bevatten open standaard versleutelings methoden om de data tijdens de overdracht verder te maskeren.


Index: sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html	9 Nov 2009 06:01:46 -0000	1.1
+++ sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.2. Het definiëren van onderzoeken en testen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling"/><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling"/><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Comm
 on_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.2. Het definiëren van onderzoeken en testen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing">1.2.2. Het definiëren van onderzoeken en testen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.2. Het definiëren van onderzoeken en testen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling"/><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling"/><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html" title="1.2.3. Het evalueren van de gereedschappen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Con
 tent/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.2. Het definiëren van onderzoeken en testen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing">1.2.2. Het definiëren van onderzoeken en testen</h3></div></div></div><div class="para">
 			Kwetbaarheidsonderzoeken kunnen verdeeld worden in twee types:<em class="firstterm">van buiten naar binnen kijken</em> en <em class="firstterm">van binnen rondkijken</em>.
 		</div><div class="para">
 			When performing an outside looking in vulnerability assessment, you are attempting to compromise your systems from the outside. Being external to your company provides you with the cracker's viewpoint. You see what a cracker sees — publicly-routable IP addresses, systems on your <em class="firstterm">DMZ</em>, external interfaces of your firewall, and more. DMZ stands for "demilitarized zone", which corresponds to a computer or small subnetwork that sits between a trusted internal network, such as a corporate private LAN, and an untrusted external network, such as the public Internet. Typically, the DMZ contains devices accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers.


Index: sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html	9 Nov 2009 06:01:46 -0000	1.1
+++ sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.3. Het evalueren van de gereedschappen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling"/><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Het definiëren van onderzoeken en testen"/><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Commo
 n_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3. Het evalueren van de gereedschappen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools">1.2.3. Het evalueren van de gereedschappen</h3></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2.3. Het evalueren van de gereedschappen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-Vulnerability_Assessment.html" title="1.2. Kwetsbaarheid beoordeling"/><link rel="prev" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Het definiëren van onderzoeken en testen"/><link rel="next" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html" title="1.2.3.2. Nessus"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Cont
 ent/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Evaluating_the_Tools-Nessus.html"><strong>Volgende</strong></a></li></ul><div class="section" title="1.2.3. Het evalueren van de gereedschappen"><div class="titlepage"><div><div><h3 class="title" id="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools">1.2.3. Het evalueren van de gereedschappen</h3></div></div></div><div class="para">
 			Een onderzoek kan beginnen met het gebruik van een informatie verzamel gereedschap. Als het gehele netwerk onderzocht wordt, maak dan eerst een plattegrond om de host te vinden die er in draaien. Zodra die gevonden zijn, bekijk dan iedere host individueel. Concentreren op deze hosts vereist een andere set gereedschappen. Te weten welke gereedschappen gebruikt moeten worden kan de beslissende stap zijn in het vinden van kwetsbaarheden.
 		</div><div class="para">
 			Net als in elk onderdeel van het dagelijkse leven, zijn er veel verschillende gereedschappen die dezelfde taak uitvoeren. Dit concept is ook van toepassing op het uitvoeren van kwetbaarheidsonderzoeken. Er zijn gereedschappen specifiek voor operating systemen, toepassingen, en zelfs netwerken (afhankelijk van het gebruikte protocol). Sommige gereedschappen zijn gratis, andere niet. Sommige gereedschappen zijn intuïtief en gemakkelijk te gebruiken, terwijl andere cryptisch en slecht gedocumenteerd zijn maar met eigenschappen die andere niet hebben.


Index: sect-Security_Guide-Vulnerability_Assessment.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-Vulnerability_Assessment.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-Vulnerability_Assessment.html	9 Nov 2009 06:01:46 -0000	1.1
+++ sect-Security_Guide-Vulnerability_Assessment.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2. Kwetsbaarheid beoordeling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/><link rel="prev" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Het definiëren van onderzoeken en testen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Co
 ntent/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Security_Overview.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.2. Kwetsbaarheid beoordeling"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Vulnerability_Assessment">1.2. Kwetsbaarheid beoordeling</h2></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>1.2. Kwetsbaarheid beoordeling</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/><link rel="prev" href="chap-Security_Guide-Security_Overview.html" title="Hoofdstuk 1. Beveiligings overzicht"/><link rel="next" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html" title="1.2.2. Het definiëren van onderzoeken en testen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/
 images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Security_Overview.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html"><strong>Volgende</strong></a></li></ul><div xml:lang="nl-NL" class="section" title="1.2. Kwetsbaarheid beoordeling"><div class="titlepage"><div><div><h2 class="title" id="sect-Security_Guide-Vulnerability_Assessment">1.2. Kwetsbaarheid beoordeling</h2></div></div></div><div class="para">
 		Met voldoende tijd, hulpbronnen, en motivatie, kan een cracker in bijna elk systeem inbreken. Uiteindelijk kunnen alle beveiligings procedures en technologiën die nu beschikbaar zijn, niet garanderen dat elk systeem volledig beveiligd is tegen indringing. Routers helpen de gateways naar het Internet te beveiligen. Firewalls helpen om de randen van het netwerk te beveiligen. Virtual Private Networks geven data veilig door met een versleutelde stroom. Indringings detectie systemen waarschuwen je voor kwaadwillige activiteiten. Het succes van al deze technologiën hangt echter af van een aantal variabelen, zoals:
 	</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 				De deskundigheid van de werknemers die verantwoordelijk zijn voor het instellen, bewaken, en onderhouden van de technologiën.


Index: sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html	9 Nov 2009 06:01:46 -0000	1.1
+++ sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4.3. xinetd configuratie bestanden veranderen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden"/><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. De /etc/xinetd.d/ map"/><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Toegangs controle opties"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><
 a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3. xinetd configuratie bestanden veranderen"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files">2.5.4.3. xinetd configuratie bestanden veranderen</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4.3. xinetd configuratie bestanden veranderen</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden"/><link rel="prev" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html" title="2.5.4.2. De /etc/xinetd.d/ map"/><link rel="next" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html" title="2.5.4.3.2. Toegangs controle opties"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a clas
 s="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Altering_xinetd_Configuration_Files-Access_Control_Options.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.3. xinetd configuratie bestanden veranderen"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files">2.5.4.3. xinetd configuratie bestanden veranderen</h4></div></div></div><div class="para">
 				Een aantal instructies is beschikbaar voor service de beschermd worden door <code class="systemitem">xinetd</code>. Deze paragraaf laat een aantal veel gebruikte opties zien.
 			</div><div class="section" title="2.5.4.3.1. Logging opties"><div class="titlepage"><div><div><h5 class="title" id="sect-Security_Guide-Altering_xinetd_Configuration_Files-Logging_Options">2.5.4.3.1. Logging opties</h5></div></div></div><div class="para">
 					De volgende opties zijn beschikbaar voor zowel <code class="filename">/etc/xinetd.conf</code> als de service specifieke bestanden in de <code class="filename">/etc/xinetd.d/</code> map.


Index: sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html
===================================================================
RCS file: /cvs/fedora/web/html/docs/security-guide/f12/nl-NL/html/sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html	9 Nov 2009 06:01:46 -0000	1.1
+++ sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory.html	17 Nov 2009 21:54:44 -0000	1.2
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
 <!DOCTYPE html
   PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4.2. De /etc/xinetd.d/ map</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden"/><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen"/></head><body class="draft "><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></
 a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.2. De /etc/xinetd.d/ map"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory">2.5.4.2. De /etc/xinetd.d/ map</h4></div></div></div><div class="para">
+<html xmlns="http://www.w3.org/1999/xhtml"><head><title>2.5.4.2. De /etc/xinetd.d/ map</title><link rel="stylesheet" href="./Common_Content/css/default.css" type="text/css"/><meta name="generator" content="publican"/><meta name="package" content="Fedora-security-guide-12-nl-NL-1.1-Security_Guide_11"/><link rel="home" href="index.html" title="Beveiligings gids"/><link rel="up" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden"/><link rel="prev" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html" title="2.5.4. xinetd configuratie bestanden"/><link rel="next" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html" title="2.5.4.3. xinetd configuratie bestanden veranderen"/></head><body class=""><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site"/></a><a c
 lass="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site"/></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html"><strong>Terug</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-xinetd_Configuration_Files-Altering_xinetd_Configuration_Files.html"><strong>Volgende</strong></a></li></ul><div class="section" title="2.5.4.2. De /etc/xinetd.d/ map"><div class="titlepage"><div><div><h4 class="title" id="sect-Security_Guide-xinetd_Configuration_Files-The_etcxinetd.d_Directory">2.5.4.2. De /etc/xinetd.d/ map</h4></div></div></div><div class="para">
 				De <code class="filename">/etc/xinetd.d/</code> map bevat de configuratie bestanden voor elke service die beheerd wordt door <code class="systemitem">xinetd</code> en de namen van de bestanden komen overeen met die van de service. Zoals met <code class="filename">xinetd.conf</code>, wordt deze map gelezen als de <code class="systemitem">xinetd</code> service wordt opgestart. Om veranderingen effect te laten hebben, moet de beheerder de <code class="systemitem">xinetd</code> service opnieuw opstarten.
 			</div><div class="para">
 				Het formaat van de bestanden in de <code class="filename">/etc/xinetd.d/</code> map gebruikt dezelfde conventie als <code class="filename">/etc/xinetd.conf</code>. De belangrijkste reden dat de instelling voor elke service in een apart bestand wordt bewaard is om aanpassingen eenvoudiger te maken zonder effect te hebben op andere services.




More information about the Fedora-docs-commits mailing list