Index:
A B C D E F G H I K L M N O P Q R S T U V W
Administrator Privileges Required
Microsoft Internet Service Manager
Using a Browser to Administer Peer Web Services
annotation file
Creating Annotation Files
Configuring FTP Logon
Configuring the Anonymous User Account
Controlling Anonymous Access
How Anonymous Logons and Client Authentication Interact
The Service Property Sheet
anonymous logons
Associating Interpreters with Applications (Script Mapping)
Creating the Applications or Scripts
Installing Your Application on Peer Web Services
Publishing Dynamic Applications
Running Your Application
The Network Application
The ODBC Application
The Services Application
associating
Creating Customized Authentication Schemes
How Anonymous Logons and Client Authentication Interact
Requiring a User Name and Password
The Service Property Sheet
authentication
bandwidth control
Basic clear-text authentication
BIND
bits per second (bps)
bps
browser
cache
Acquiring a Certificate
Generating a Key Pair
Installing a Certificate with a Key Pair
CGI and Peer Web Services
CGI Application Returns Data to Server
Common Gateway Interface
Creating the Applications or Scripts
Security Considerations for Executables
Server Passes Request to Application
Server Receives Request
Server Returns Data to Client
CGI
challenge/response
Creating Customized Authentication Schemes
How Anonymous Logons and Client Authentication Interact
Requiring a User Name and Password
The Service Property Sheet
client/server architecture
Creating the Applications or Scripts
Common Gateway Interface (CGI)
Using Computer Names and LMHOSTS
Using Computer Names with WINS Servers
Configuring Content Directories
Configuring Logging
General Networking Issues
Typical Network Configurations
Windows NT Configuration and Security Checklists
Windows NT Configuration Checklist
Windows NT Security Checklist
Access Check Boxes
Account Information
Configuring Content Directories
Home Directory
Virtual Directory
Configuring Logging
Configuring and Managing Services
General Networking Issues
Typical Network Configurations
Windows NT Configuration and Security Checklists
Windows NT Configuration Checklist
Windows NT Security Checklist
connected user
Windows NT Configuration Checklist
Customizing Messages
Configuring a Single Content Directory
Configuring Content Directories
Configuring Server Options with Control Panel
The Network Application
The ODBC Application
The Services Application
Configuring and Managing Services
Controlling Access by User or Group
Controlling Anonymous Access
Creating Customized Authentication Schemes
Setting File Access with Windows Explorer
cryptography
data integrity
Data Source Name (DSN)
Securing Data Transmissions with Secure Sockets Layer (SSL)
Authoring Web Pages with Database Access
How the Internet Database Connector Works
Installing ODBC and Creating System Data Sources
Learning the Features of the Internet Database Connector
Publishing Information and Using a Database
Understanding the Sample.htx File
Walking through a Sample Database Query
Walking through a Sample Database Query
Setting the Default Document and Directory Browsing
Glossary
Requiring a User Name and Password
Using DHCP in Your Intranet
DHCP
dial-up
The Directories Property Sheet
Directory Listing
Do Not Enable Directory Browsing
Setting the Default Document and Directory Browsing
The Directories Property Sheet
Setting Listing Style
Configuring a Single Content Directory
Configuring Content Directories
Using Domain Names with DNS Servers
Web Browser URL Request
DNS spoofing
DNS
domain controller
Web Browser URL Request
Domain Name System (DNS)
Using Domain Names and HOSTS
Using Domain Names with DNS Servers
domain
DSN
Creating the Applications or Scripts
Installing Your Application on Peer Web Services
ISAPI Perl Available for Download
Running Your Application
Dynamic Host Configuration Protocol (DHCP)
Configuring Logging
How to Read Log Files
Log to File
encryption
Error Messages
Tracking Problems with Event Viewer
Auditing File Access
Setting NTFS Permissions
NTFS File Security
How Does the FTP Service Work?
What is the FTP Service?
When Should I Use the FTP Service?
File Transfer Protocol (FTP)
file-name extension mapping
filter
firewall
friendly name
Name Resolution Systems
FTP Clients
Configuring FTP Directories
Creating Annotation Files
Setting Listing Style
Setting Read and Write Permission
Setting the Home Directory
Special Directories in the Home Directory
FTP Guest Account Access
Configuring FTP Logon
Controlling Anonymous Connections
Customizing Messages
Configuring and Managing Services
Configuring FTP Logon
Configuring Session Activity
FTP Service Registry Entries
How Anonymous Logons and Client Authentication Interact
How Does the FTP Service Work?
Requiring a User Name and Password
What is the FTP Service?
When Should I Use the FTP Service?
FTP
gateway
Gopher Plus
Configuring and Managing Services
Configuring the Gopher Service
Gopher Service Registry Entries
What is the Gopher Service?
gopher
gopherspace
Controlling Access by User or Group
FTP Guest Account Access
About Online Help
Home Directory
Setting the Home Directory
Special Directories in the Home Directory
home directory
Default.htm and the Peer Web Services Home Page
Using Domain Names and HOSTS
Authoring HTML Files
Directory Listing
Dynamic Pages
How Does Peer Web Services Work?
Publishing HTML and Other File Formats
Static Pages
Using Select Multiple List Boxes in HTML Forms
Using URLs and Creating HTML Links for Intranets
Web Browser URL Request
Web Server Response
CurrentRecord, MaxRecords
HTML Extension (.htx) Files
HTTP variables
Parameters from Internet Database Connector files
Understanding the Sample.htx File
Using a Browser to Administer Peer Web Services
HTML
HTTP
hyperlink
Hypertext Markup Language (HTML)
Hypertext Transfer Protocol (HTTP)
hypertext
Including Other Files with the Include Statement
Setting up WAIS Index Queries
Administrator Privileges Required
Before Installing Peer Web Services
FTP Guest Account Access
How to Test Your Peer Web Services Installation
Installation Folder
Installation Overview
Installation Requirements
Installing Peer Web Services
Remove All Button
Windows NT Configuration and Security Checklists
Integrated Services Digital Network (ISDN)
interactive applications
How to Publish Information
Installation Requirements
Internet Sites
What is the Internet?
Unbind Unnecessary Services from Your Internet Adapter Cards
Windows NT Configuration Checklist
How the Internet Database Connector Works
Learning the Features of the Internet Database Connector
What is Internet Explorer?
Internet Log Converter
Internet Network Information Center (InterNIC)
Internet Protocol (IP) address
Internet Protocol (IP)
Creating the Applications or Scripts
Administering Servers with Internet Service Manager
Microsoft Internet Service Manager
Using a Browser to Administer Peer Web Services
Windows NT Configuration Checklist
Internet Service Providers (ISPs)
Internet
InterNIC
How to Publish Information
Installation Requirements
Intranet Scenarios
Intranet Sites
Publishing on an Intranet
What is an Intranet?
intranet
Name Resolution Systems
IP address
Troubleshooting an IP Network
IP
Creating the Applications or Scripts
Execute Permission for ISAPI Applications
Internet Server API
ISAPI Perl Available for Download
ISDN
ISPs
The IUSR_computername Account
Acquiring a Certificate
Backing Up Keys
Generating a Key Pair
Installing a Certificate with a Key Pair
Moving a Key Pair to Another Server
Acquiring a Certificate
Backing Up Keys
Generating a Key Pair
Generating a Key Pair on Another Computer
Installing a Certificate with a Key Pair
Loading a Key Created with Keygen.exe and Setkey.exe
Loading Backed Up Keys
Moving a Key Pair to Another Server
leased line
link
Using Computer Names and LMHOSTS
log file
Configuring Logging
Converting Log File Formats
How to Read Log Files
Log to File
Configuring Logging
Converting Log File Formats
How to Read Log Files
The Logging Property Sheet
logging
The Logging Property Sheet
Management Information Databases (MIBs)
MIBs
Creating the Applications or Scripts
MIME Type Configuration
Server MIME Mapping
MIME mapping
Configuring Logging
Monitoring Services with Performance Monitor
Configuring Content Directories
MIME Type Configuration
Multipurpose Internet Mail Extension (MIME) mapping
Name Resolution Systems
name resolution
The Network Application
General Networking Issues
Typical Network Configurations
Network News Transfer Protocol (NNTP)
Running Other Network Services
Running Other Network Services
NNTP
How Peer Web Services Security Works
NTFS File Security
Setting NTFS Permissions
32-Bit ODBC Drivers
Converting 16-Bit ODBC Drivers to 32-Bit during Setup
Installing ODBC and Creating System Data Sources
Microsoft Access ODBC Drivers
ODBC Advanced Optional Fields
Publishing Information and Using a Database
The ODBC Application
About Online Help
About the Online Examples
packet
Directory Listing
Dynamic Pages
Static Pages
Web Server Response
page
Controlling Security by User Name and Password
Requiring a User Name and Password
password authentication
Starting, Stopping, and Pausing Services
How Do I Use Peer Web Services?
How Does Peer Web Services Work?
How Peer Web Services Security Works
What Can I Do with Peer Web Services?
What is Peer Web Services?
Peer Web Services
Accessibility for People with Disabilities
Customizing Windows or Windows NT
Documentation in Alternative Formats
Getting More Accessibility Information
Windows 95 and Windows NT 4.0 Accessibility Features
Monitoring Services with Performance Monitor
Setting Read and Write Permission
policies
port number
Authoring HTML Files
Including Other Files with the Include Statement
MIME Type Configuration
Preparing Information for Publishing
Publishing HTML and Other File Formats
program file
protocol
proxy
Attempting to Publish from Redirected Network Drives
How to Publish Information
Installation Requirements
Preparing Information for Publishing
Publishing Dynamic Applications
Publishing Information and Using a Database
Publishing on an Intranet
Setting WWW Directory Access
Configuring a Single Content Directory
Attempting to Publish from Redirected Network Drives
How to Publish Information
Installation Requirements
Attempting to Publish from Redirected Network Drives
How to Publish Information
Installation Requirements
Publishing on an Intranet
Using Batch Queries and Multiple Queries
Walking through a Sample Database Query
Intranet Scenarios
RAS
Setting Read and Write Permission
How to Read Log Files
Attempting to Publish from Redirected Network Drives
Adding Virtual Directories by Using the Registry
Creating Registry Entries
Adding Virtual Directories by Using the Registry
Associating Interpreters with Applications (Script Mapping)
Creating Registry Entries
FTP Service Registry Entries
Global Registry Entries
Gopher Service Registry Entries
Server MIME Mapping
Service-Specific Registry Entries with Common Names
Setup Registry Entries
WWW Service Registry Entries
Remote Access Service (RAS)
Using a Browser to Administer Peer Web Services
remote administration
Remote Procedure Call (RPC)
Content Folders and Files
Event Log Availability
Remove All Button
Routers and Security Devices
router
Routers and Security Devices
RPC
Associating Interpreters with Applications
Security Implications
Understanding the Sample.htx File
script
Associating Interpreters with Applications (Script Mapping)
Installing Your Application on Peer Web Services
Publishing Dynamic Applications
Running Your Application
Configuring a Directory to Require SSL
How Peer Web Services Security Works
Securing Data Transmissions with Secure Sockets Layer (SSL)
Suggestions for SSL Configuration and Operation
Secure Sockets Layer (SSL)
Configuring FTP Logon
Controlling Access by User or Group
Controlling Anonymous Access
How Peer Web Services Security Works
Routers and Security Devices
Running Other Network Services
Securing Data Transmissions with Secure Sockets Layer (SSL)
Security Considerations for Executables
Setting File Access with Windows Explorer
Setting Folder and File Permissions
Setting Up User Accounts
Setting WWW Directory Access
Windows NT Security Checklist
Configuring Logging
The Service Property Sheet
service
Configuring and Managing Services
Configuring Logging
Selecting a View
Starting, Stopping, and Pausing Services
The Services Application
What is the Gopher Service?
Selecting a View
Starting, Stopping, and Pausing Services
Verifying TCP/IP Session Communications
Converting 16-Bit ODBC Drivers to 32-Bit during Setup
Setup Process for Peer Web Services
The IUSR_computername Account
Publishing Dynamic Applications
The Network Application
Simple Mail Transfer Protocol (SMTP)
Simple Network Management Protocol (SNMP)
Configuring a Single Content Directory
slow link
SMTP
SNMP
Using Batch Queries and Multiple Queries
Configuring a Directory to Require SSL
How Peer Web Services Security Works
Securing Data Transmissions with Secure Sockets Layer (SSL)
Suggestions for SSL Configuration and Operation
SSL security
Starting, Stopping, and Pausing Services
static page
Starting, Stopping, and Pausing Services
Internet Sites
subnet mask
System Data Source Name (DSN)
Installing ODBC and Creating System Data Sources
Creating Tag Files
Interpreting Item Types
Tag Files
tag files
General Networking Issues
Verifying TCP/IP Session Communications
TCP/IP
How to Test Your Peer Web Services Installation
General Networking Issues
Transmission Control Protocol/Internet Protocol (TCP/IP)
Securing Data Transmissions with Secure Sockets Layer (SSL)
Tracking Problems with Event Viewer
Troubleshooting an IP Network
How Does Peer Web Services Work?
Using URLs and Creating HTML Links for Intranets
Web Browser URL Request
Uniform Resource Locator (URL)
How Does Peer Web Services Work?
Using URLs and Creating HTML Links for Intranets
Web Browser URL Request
URL
Usenet
Configuring and Managing Services
Controlling Access by User or Group
Controlling Anonymous Access
Creating Customized Authentication Schemes
FTP Guest Account Access
Setting File Access with Windows Explorer
Configuring the Anonymous User Account
Requiring a User Name and Password
Setting Up User Accounts
User Accounts
Report View
Selecting a View
Servers View
Services View
Adding Virtual Directories by Using the Registry
Creating Virtual Directories
Virtual Directory
virtual directory
volatile objects
Setting up WAIS Index Queries
Web browser
Client Errors Browsing FTP, Directory Annotation Enabled
How Does Peer Web Services Work?
Using a Browser to Administer Peer Web Services
Web Browser URL Request
Web Server Response
Web page
Authoring Web Pages with Database Access
Directory Listing
Dynamic Pages
Static Pages
Web Browser URL Request
Web Server Response
Connecting to a Web Server
How to Test Your Peer Web Services Installation
Using a Browser to Administer Peer Web Services
Web server
Setting up WAIS Index Queries
Setting File Access with Windows Explorer
Windows Internet Name Service (WINS) server
Configuring Server Options with Control Panel
How Peer Web Services Security Works
Setting NTFS Permissions
Using Other Windows NT Tools
Windows NT Configuration and Security Checklists
Windows NT Configuration Checklist
Windows NT Security Checklist
Using Computer Names with WINS Servers
WINS server
World Wide Web (WWW)
Setting WWW Directory Access
Configuring and Managing Services
How Anonymous Logons and Client Authentication Interact
Requiring a User Name and Password
Understanding the Sample.htx File
WWW Service Registry Entries
WWW
© 1996 by Microsoft Corporation. All rights reserved.