A

access
read
write
access control
choosing what to protect
host names and
IP addresses and
Not Found message
resources and
user databases and
administration server
restricting access to
security and
administration server, configuring
applications
client-side
server-side
authentication
client
defined
server
authentication certificates

B

buttons
figure of
top of forms

C

cache
defined
caching files
CAs
certificate
certificate authority
certificate request, information needed
certificates
deleting
distinguished name
managing
Certification Authorities
CGI
defined
CGI directories
editing
removing
CGI programs
changing the server's location
changing the server's user account
character set, assigning
CHROOT
ciphers
defined
ciphertext
client applications
HTTP servers and
client authentication
clients
accessing the server
customized error messages for
client-side applications
CNAME
DNS and
Common Gateway Interface
defined
common logfile format
computer requirements
configuration templates
applying
creating
removing
configuring
administration server
controlling access to the server
conventions, used in this book
converting NCSA user databases
creating databases
cryptography
customizing error messages
Cypherpunks

D

databases
adding users
creating
creating groups
editing groups
editing users
file format
listing groups
listing users
password, changing
removing
removing groups
removing users
DBM
decryption
keys
defaults
file types
deleting certificates
directories
listing files in
moving the server
moving to another server
protecting access to
directory indexing
distinguished name
DNS
defined
DNS alias
document directories
additional
primary
document directory
document footer, specifying
document preferences
default MIME type
directory indexing
server home page
document root
configuring
SSL and
domain name servers
Domain Name System
Domain Name System, using with server
domain name, server
dynamic configuration

E

encryption
keys
public-key
signing files
symmetric
error responses
customizing
Expires header
defined

F

features, list of
file extension, defined
file types
defined
setting default
files
moving to another server
protecting access to
firewalls
fonts
monospaced, used in this book
used in this book
forwarding URLs
ftp

G

GIF, defined
groups
creating
defined
editing
listing
removing

H

Home Page
specifying
host names
restricting access by using
hostname
defined
HTML, defined
HTTP
defined
URLs and
http
defined
HTTP servers
defined
HTTPD
defined
HTTPS
defined
https
SSL and

I

importing
NCSA user databases
users
index.html, specifying
information
Internet and
inittab
defined
editing
starting the server with
installation
directories created
errors (uid)
files created
preparation for
upgrading servers
user account needed
what it does
installing LiveWire applications
integrity
Internet
defined
Internet Protocol (IP)
defined
intranet
defined
IP address
IP address, defined
IP addresses
access control and

J

Java
JavaScript

K

key size
keys
private
public
session

L

LiveWire
LiveWire applications
installing
logging
security

M

magnus.conf
managing certificates
MD5, defined
message integrity
signing files
MIME
defined
MIME types
default
monospaced fonts
used in this book
multimedia
WWW and

N

NCSA user databases
importing
Netscape Server Manager, starting
NIS
defined
nntp
nobody user account
Not Found message, access control and
ns-admin.conf file

O

overview of this manual

P

parsed HTML, customizing
password file
passwords
changing for databases
port numbers
recommended
security and
starting the server
ports
80 (HTTP)
above 102
changing
clients and
HTTPS
recommended
server
pragma no-cache
preferences
global
primary document directory, setting
prime numbers
privacy
private key
private keys
processes
server and
programs
CGI
Java
JavaScript
LiveWire
protocol
defined
TCP/IP
public directories
configuring
public information directories
customizing
public key
public keys
public-key encryption

R

RAM
defined
rc.local
starting the server with
read access
realm
defined
redirection
removing databases
resource
defined
resources
configuring
controlling access to
restarting the server
restricting access
root
defined
server and

S

Secure Sockets Layer (SSL)
security
authentication and
encryption and
increasing
integrity and
keys
Security directive
security log
server
starting
server authentication
explained
server daemon
defined
server home page
server name
aliases
changing
CNAME and
server plug-in API
server processes
sp
server root
defined
server settings, viewing
server threads, setting
server user account
ServerCert directive
ServerKey directive
servers
computer requirements for
controlling access to
features list
home pages for
HTTP defined
location, changing
moving files
ports above 102
ports under 102
processes
redirecting URLs to
restricting access to
root user
slow performance
starting
user account for
stopping
upgrading
user account, changing
server-side applications
session key
session keys
signing files
smtp
SOCKS
defined
spoofing
SSL
defined
document root and
enabling and disabling
information needed to enable
preparation for
signing files
SSL-enabled browsers
starting the server
user account needed
stopping the server
styles, in this book
superuser
defined
symmetric encryption
system preferences
configuring

T

TCP/IP
telnet
templates, configuration
terms used in this book
terms, in this book
threads, setting server
top-level domain authority
troubleshooting installation
typestyles used in this book

U

uid
defined
installation errors and
Uniform Resource Locators
Unix
user accounts
upgrading
URL database
defined
URLs
defined
format of
forwarding
redirecting to servers
SSL-enabled servers and
user account
changing
server and
user accounts
nobody
user authorization
user databases
adding users
creating
creating groups
defined
editing groups
editing users
file format
importing NCSA databases
listing groups
listing users
password, changing
removing
removing groups
removing users
user directories
configuring
customizing
users
adding to databases
defined
editing
importing
listing in databases
removing from databases

V

viewing server settings

W

wildcard patterns
defined
examples of
write access
WWW (World Wide Web)
described