All security begins at the physical layer ”the actual computer hardware. It's always a sound practice to ensure that access to servers is limited to only authorized personnel, such as Domino and/or network administrators. Servers should be in a physically secure location, such as a locked server room, to ensure that the server isn't accessed by unauthorized users or damaged or disrupted either intentionally or accidentally . Obviously, all the protection in the world does no good if a would-be hacker or vandal can walk right up to the server and steal or destroy your valuable corporate information and your entire Domino environment can be taken offline by something as simple as a power cable being knocked out of the plug. The bottom line is that you should strive to locate your Domino server(s) in a physically secure location.
Additionally, when a server ID is created, a password can be set so that users cannot access the server directly unless the password is known. Although this feature is often beneficial if the server cannot be physically secured, it can present a problem if the server must be rebooted remotely or by a user who doesn't know the server password. If you'd like to learn more about setting the server password, see the Lotus Domino Administrator 6 Help database (help6_admin.nsf).
Part I. Introduction to Release 6
Whats New in Release 6?
The Release 6 Object Store
The Integrated Development Environment
Part II. Foundations of Application Design
Forms Design
Advanced Form Design
Designing Views
Using Shared Resources in Domino Applications
Using the Page Designer
Creating Outlines
Adding Framesets to Domino Applications
Automating Your Application with Agents
Part III. Programming Domino Applications
Using the Formula Language
Real-World Examples Using the Formula Language
Writing LotusScript for Domino Applications
Real-World LotusScript Examples
Writing JavaScript for Domino Applications
Real-World JavaScript Examples
Writing Java for Domino Applications
Real-World Java Examples
Enhancing Domino Applications for the Web
Part IV. Advanced Design Topics
Accessing Data with XML
Accessing Data with DECS and DCRs
Security and Domino Applications
Creating Workflow Applications
Analyzing Domino Applications
Part V. Appendices
Appendix A. HTML Reference
Appendix B. Domino URL Reference