
740
Setting the Apache User Account
3. Enter the IP address and the host name for the virtual host.
The IP address is usually the IP address assigned to the Apache server,
and the host name is the DNS name used to access the virtual host.
4. If you want to provide an alias for the virtual host, click the Add
button, enter the alias name, and click OK.
An alias is often used for Web sites that are used on an intranet rather
than on public Web sites. For example, if you’re setting up an intranet
Web site for your company suggestion box, the full DNS name for the
virtual host might be suggestionbox.mycompany.com. But if you pro-
vide just suggestionbox as an alias, users can access the suggestion
box Web site by using suggestionbox rather than suggestionbox.
mycompany.com as the Web site address.
5. Use the other tabs of the Virtual Host Properties dialog box to config-
ure additional options.
For example, you might want to use the Page Options tab to change the
directory page search list or designate custom error pages.
6. Click OK.
The virtual host is created. You’re returned to the HTTP configuration
tool, and the new virtual host will appear in the Virtual Hosts list.
Setting the Apache User Account
The Server tab of the HTTP configuration tool lets you set several configura-
tion options, the most important of which is the user account that Apache
will run under. By default, this account is named apache, and it belongs to
a group named apache. This account is created automatically when you
install Apache, so you don’t have to do anything special to configure it.
Although it may be tempting, resist the urge to change this user setting to a
user account with more rights. If you do so, you run the risk of a major secu-
rity breach. An intelligent hacker can use a Web browser to break into your
system. But the hacker will be constrained by the rights granted to the user
account that Apache runs under. One of the worst mistakes you could make
would be to change this user account from apache to root. Then, a hacker
who manages to exploit a security hole in your Web site will have virtually
free reign over your Linux server.
68_625873-bk09ch06.indd 74068_625873-bk09ch06.indd 740 9/21/10 10:47 PM9/21/10 10:47 PM