AuthUserFile /var/lib/webalizer/passwd
Require valid-user
</Location>
Create the password file with the
# htpasswd -c /var/lib/webalizer/passwd
New password:
Re-type new password:
Adding password for user chris
The SELinux context of the directory containing the password file must be changed in order for this to work:
# chcon -t httpd_sys_content_t /var/lib/webalizer/
The statistics reports should now be accessible using a web browser on any computer.
7.12.2. How Does It Work?
The script
The script file
The web directory
Webalizer analyzes web files and logfiles to determine usage patterns; it can process the Apache common and combined logfile formats, and the
The generated reports are saved as HTML pages and PNG graphics.
7.12.3. Where Can I Learn More?
? The manpages for
? The Webalizer web site: http://webalizer.org/
? Information on the Apache logfile format: http://httpd.apache.org/docs/2.2/logs.html
? Information on the wu-ftp/vsftp logfile format: http://www.wu-ftpd.org/man/xferlog.html
Chapter 8. Securing Your System
System security maintenance is an essential task when running a computer, but it's never been particularly glamorous or fun. The basic goal of system security is to ensure that the system provides the services it is supposed to provide, cannot be subverted to do things it was not intended to do, and to ensure that the services remain available for use.
Effective security requires a multipronged approach, and Fedora provides effective tools to secure your system in several different ways:
Filtering of network traffic
System activity logging and automatic monitoring tools
Discretionary access controls such as permissions and access control lists
Mandatory access controls through SELinux
Intrusion-detection tools and immutable file attributes to detect and prevent file alteration
Tools to delegate specific system administration privileges to different users
Together with automated software updates, these tools enable you to efficiently maintain your system security.
8.1. Prevent Unwanted Connections
Most Fedora systems are connected to a TCP/IP network. You can guard against unwanted inbound connections to your system by using the built-in firewall.
8.1.1. How Do I Do That?
To adjust the Fedora firewall graphically, select the menu option System>Administration>'Security Level and Firewall.' After you enter the
Figure 8-1. Firewall configuration tool
The control at the top of this window enables and disables the firewall. When the firewall is enabled, the lower portion of this window can be used to permit connections to your system for selected services; simply select