httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From k...@apache.org
Subject svn commit: r597933 - in /httpd/httpd/trunk/docs/manual/misc: security_tips.html.en security_tips.xml
Date Sun, 25 Nov 2007 00:18:28 GMT
Author: kess
Date: Sat Nov 24 16:18:27 2007
New Revision: 597933

URL: http://svn.apache.org/viewvc?rev=597933&view=rev
Log:
typos
found by Lucien GENTIS

Modified:
    httpd/httpd/trunk/docs/manual/misc/security_tips.html.en
    httpd/httpd/trunk/docs/manual/misc/security_tips.xml

Modified: httpd/httpd/trunk/docs/manual/misc/security_tips.html.en
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/misc/security_tips.html.en?rev=597933&r1=597932&r2=597933&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/misc/security_tips.html.en (original)
+++ httpd/httpd/trunk/docs/manual/misc/security_tips.html.en Sat Nov 24 16:18:27 2007
@@ -208,7 +208,7 @@
     
     <p>To isolate the damage a wayward SSI file can cause, a server 
     administrator can enable <a href="../suexec.html">suexec</a> as 
-    described in the <a href="#cgi">CGI in General</a> section</p>
+    described in the <a href="#cgi">CGI in General</a> section.</p>
     
     <p>Enabling SSI for files with .html or .htm extensions can be 
     dangerous. This is especially true in a shared, or high traffic, 
@@ -220,7 +220,7 @@
     programs from SSI pages. To do this replace <code>Includes</code>
     with <code>IncludesNOEXEC</code> in the <code class="directive"><a
href="../mod/core.html#options">Options</a></code> directive.  Note that users
may 
     still use &lt;--#include virtual="..." --&gt; to execute CGI scripts if 
-    these scripts are in directories desginated by a <code class="directive"><a
href="../mod/mod_alias.html#scriptalias">ScriptAlias</a></code> directive.</p>
+    these scripts are in directories designated by a <code class="directive"><a
href="../mod/mod_alias.html#scriptalias">ScriptAlias</a></code> directive.</p>
     
   </div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif"
/></a></div>
 <div class="section">
@@ -357,7 +357,7 @@
     
     <p>Pay particular attention to the interactions of <code class="directive"><a
href="../mod/core.html#location">Location</a></code> and <code class="directive"><a
href="../mod/core.html#directory">Directory</a></code> directives; for instance,
even 
     if <code>&lt;Directory /&gt;</code> denies access, a <code>
-    &lt;Location /&gt;</code> directive might overturn it</p>
+    &lt;Location /&gt;</code> directive might overturn it.</p>
     
     <p>Also be wary of playing games with the <code class="directive"><a href="../mod/mod_userdir.html#userdir">UserDir</a></code>
directive; setting it to 
     something like "./" would have the same effect, for root, as the first 

Modified: httpd/httpd/trunk/docs/manual/misc/security_tips.xml
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/misc/security_tips.xml?rev=597933&r1=597932&r2=597933&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/misc/security_tips.xml (original)
+++ httpd/httpd/trunk/docs/manual/misc/security_tips.xml Sat Nov 24 16:18:27 2007
@@ -205,7 +205,7 @@
     
     <p>To isolate the damage a wayward SSI file can cause, a server 
     administrator can enable <a href="../suexec.html">suexec</a> as 
-    described in the <a href="#cgi">CGI in General</a> section</p>
+    described in the <a href="#cgi">CGI in General</a> section.</p>
     
     <p>Enabling SSI for files with .html or .htm extensions can be 
     dangerous. This is especially true in a shared, or high traffic, 
@@ -218,7 +218,7 @@
     with <code>IncludesNOEXEC</code> in the <directive
     module="core">Options</directive> directive.  Note that users may 
     still use &lt;--#include virtual="..." --&gt; to execute CGI scripts if 
-    these scripts are in directories desginated by a <directive
+    these scripts are in directories designated by a <directive
     module="mod_alias">ScriptAlias</directive> directive.</p>
     
   </section>
@@ -359,7 +359,7 @@
     module="core">Location</directive> and <directive 
     module="core">Directory</directive> directives; for instance, even 
     if <code>&lt;Directory /&gt;</code> denies access, a <code>
-    &lt;Location /&gt;</code> directive might overturn it</p>
+    &lt;Location /&gt;</code> directive might overturn it.</p>
     
     <p>Also be wary of playing games with the <directive
     module="mod_userdir">UserDir</directive> directive; setting it to 



Mime
View raw message