Return-Path:
Delivered-To: apmail-httpd-cvs-archive@www.apache.org
Received: (qmail 81343 invoked from network); 25 Nov 2007 00:18:51 -0000
Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2)
by minotaur.apache.org with SMTP; 25 Nov 2007 00:18:51 -0000
Received: (qmail 88848 invoked by uid 500); 25 Nov 2007 00:18:38 -0000
Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org
Received: (qmail 88803 invoked by uid 500); 25 Nov 2007 00:18:38 -0000
Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm
Precedence: bulk
Reply-To: dev@httpd.apache.org
list-help:
list-unsubscribe:
List-Post:
List-Id:
Delivered-To: mailing list cvs@httpd.apache.org
Received: (qmail 88792 invoked by uid 99); 25 Nov 2007 00:18:38 -0000
Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136)
by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 24 Nov 2007 16:18:38 -0800
X-ASF-Spam-Status: No, hits=-100.0 required=10.0
tests=ALL_TRUSTED
X-Spam-Check-By: apache.org
Received: from [140.211.11.3] (HELO eris.apache.org) (140.211.11.3)
by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 25 Nov 2007 00:18:27 +0000
Received: by eris.apache.org (Postfix, from userid 65534)
id 7BBED1A9832; Sat, 24 Nov 2007 16:18:29 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Subject: svn commit: r597933 - in /httpd/httpd/trunk/docs/manual/misc:
security_tips.html.en security_tips.xml
Date: Sun, 25 Nov 2007 00:18:28 -0000
To: cvs@httpd.apache.org
From: kess@apache.org
X-Mailer: svnmailer-1.0.8
Message-Id: <20071125001829.7BBED1A9832@eris.apache.org>
X-Virus-Checked: Checked by ClamAV on apache.org
Author: kess
Date: Sat Nov 24 16:18:27 2007
New Revision: 597933
URL: http://svn.apache.org/viewvc?rev=597933&view=rev
Log:
typos
found by Lucien GENTIS
Modified:
httpd/httpd/trunk/docs/manual/misc/security_tips.html.en
httpd/httpd/trunk/docs/manual/misc/security_tips.xml
Modified: httpd/httpd/trunk/docs/manual/misc/security_tips.html.en
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/misc/security_tips.html.en?rev=597933&r1=597932&r2=597933&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/misc/security_tips.html.en (original)
+++ httpd/httpd/trunk/docs/manual/misc/security_tips.html.en Sat Nov 24 16:18:27 2007
@@ -208,7 +208,7 @@
To isolate the damage a wayward SSI file can cause, a server
administrator can enable suexec as
- described in the CGI in General section
+ described in the CGI in General section.
Enabling SSI for files with .html or .htm extensions can be
dangerous. This is especially true in a shared, or high traffic,
@@ -220,7 +220,7 @@
programs from SSI pages. To do this replace Includes
with IncludesNOEXEC
in the Options
directive. Note that users may
still use <--#include virtual="..." --> to execute CGI scripts if
- these scripts are in directories desginated by a ScriptAlias
directive.
+ these scripts are in directories designated by a ScriptAlias
directive.
@@ -357,7 +357,7 @@
Pay particular attention to the interactions of Location
and Directory
directives; for instance, even
if <Directory />
denies access, a
- <Location />
directive might overturn it
+ <Location /> directive might overturn it.
Also be wary of playing games with the UserDir
directive; setting it to
something like "./" would have the same effect, for root, as the first
Modified: httpd/httpd/trunk/docs/manual/misc/security_tips.xml
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/misc/security_tips.xml?rev=597933&r1=597932&r2=597933&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/misc/security_tips.xml (original)
+++ httpd/httpd/trunk/docs/manual/misc/security_tips.xml Sat Nov 24 16:18:27 2007
@@ -205,7 +205,7 @@
To isolate the damage a wayward SSI file can cause, a server
administrator can enable suexec as
- described in the CGI in General section
+ described in the
CGI in General section.
Enabling SSI for files with .html or .htm extensions can be
dangerous. This is especially true in a shared, or high traffic,
@@ -218,7 +218,7 @@
with IncludesNOEXEC
in the Options directive. Note that users may
still use <--#include virtual="..." --> to execute CGI scripts if
- these scripts are in directories desginated by a ScriptAlias directive.
@@ -359,7 +359,7 @@
module="core">Location and
Directory directives; for instance, even
if
<Directory />
denies access, a
- <Location />
directive might overturn it
+ <Location /> directive might overturn it.
Also be wary of playing games with the UserDir directive; setting it to