Advanced Exercises


5.

If you are running Apache on a firewall system, perhaps to display a Web front end for firewall configuration, how would you make sure that it is accessible only from inside the local network?

6.

Why is it more efficient to run scripts using mod_php or mod_perl than through CGI?

7.

What two things does SSL provide and how does this differ if the certificate is self-signed?

8.

Some Web sites generate content by retrieving data from a database and inserting it into a template using PHP or CGI each time the site is accessed. Why is this practice often a poor idea?

9.

Assume you want to provide Webmail access for employees on the same server that hosts the corporate Web site. The Web site address is example.com, you want to use mail.example.com for Webmail, and the Web-mail application is located in /var/www/webmail. Describe two ways you can set this up this configuration.

10.

Part of a Web site is a private intranet and is accessed as http://example.com/intranet. Describe how you would prevent people outside the company from accessing this site. Assume the company uses the 192.168.0.0/16 subnet internally.




A Practical Guide to Red Hat Linux
A Practical Guide to Red HatВ® LinuxВ®: Fedoraв„ў Core and Red Hat Enterprise Linux (3rd Edition)
ISBN: 0132280272
EAN: 2147483647
Year: 2006
Pages: 383

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net