Securing Your Web Site |
Securing Your Web Site: An Overview |
Maintaining an activity log |
Creating users and groups |
Removing users and groups |
Restricting access to Web site folders |
However, although an activity log enables you to monitor who visits your site and how they use it, it doesn't enable you to limit who has access to your site. Everyone on your network or on the Internet can still access everything on your Web site. If you have files in your Web site folder that you don't want everyone see, use access controls to define who is allowed to gain access to the items on your site. Microsoft Personal Web Server uses Macintosh Personal File Sharing access control privileges to determine who is allowed to gain access to your Web site.
When you specify a Web Site folder, you are effectively preventing people from accessing files outside of that folder, but there are two exceptions: aliases and disk browsing.
Creating Aliases
Personal Web Server will follow aliases to the real file, if possible. For instance, suppose you had a Default.htm file on another hard disk outside the Personal Web Site folder. You can create an alias of this file (command-M in the Finder) and drag that alias into your Web Site Folder. Make sure you delete the " alias" on the end of the name, so that its name is exactly Default.htm. When Personal Web Server retrieves the file, it will see that the file is an alias, and will get the contents of the real HTML file on the other hard disk.
You can do the same with folders. Creating an alias to a folder and placing it in the Personal Web Site folder gives access to the real folder (and all its files and subfolders within it). You can even have aliases within already aliased folders.
Disk Browsing
Personal Web Server also enables you to browse the contents of your entire disk and all other disks mounted on the desktop. This is an optional feature, which you must turn on. In addition, you must choose a secure password and user name to prevent other people from gaining access to your disk by using this method. The most secure passwords contain both letters and numbers and should be changed frequently.
Related Topics
Maintaining an activity log
Creating users and groups
Using access controls
Return to top |
Note
Each line in the log file consists of several fields separated by tabs. These fields are:
Related Topic
Opening the Microsoft Personal Web Server control panel
Securing your Web site: An Overview
Visiting your home page
Return to top |
Related Topic
Removing a user or group
Restricting access to a Web site folder
Securing Your Web site: An Overview
Return to top |
Related Topics
Creating a user or group
Restricting access to a Web site folder
Securing Your Web site: An Overview
Return to top |
Notes
Related Topics
Maintaining an activity log
Opening the Microsoft Personal Web Server control panel
Register users and groups
Removing users and groups
Securing Your Web site: An Overview
Return to top |