You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by ke...@apache.org on 2007/11/25 01:52:01 UTC

svn commit: r597938 - in /httpd/httpd/branches/2.0.x/docs/manual/misc: security_tips.html.en security_tips.xml

Author: kess
Date: Sat Nov 24 16:52:01 2007
New Revision: 597938

URL: http://svn.apache.org/viewvc?rev=597938&view=rev
Log:
typos
found by Lucien GENTIS

Modified:
    httpd/httpd/branches/2.0.x/docs/manual/misc/security_tips.html.en
    httpd/httpd/branches/2.0.x/docs/manual/misc/security_tips.xml

Modified: httpd/httpd/branches/2.0.x/docs/manual/misc/security_tips.html.en
URL: http://svn.apache.org/viewvc/httpd/httpd/branches/2.0.x/docs/manual/misc/security_tips.html.en?rev=597938&r1=597937&r2=597938&view=diff
==============================================================================
--- httpd/httpd/branches/2.0.x/docs/manual/misc/security_tips.html.en (original)
+++ httpd/httpd/branches/2.0.x/docs/manual/misc/security_tips.html.en Sat Nov 24 16:52:01 2007
@@ -131,7 +131,7 @@
     
     <p>To isolate the damage a wayward SSI file can cause, a server 
     administrator can enable <a href="../suexec.html">suexec</a> as 
-    described in the <a href="#cgi">CGI in General</a> section</p>
+    described in the <a href="#cgi">CGI in General</a> section.</p>
     
     <p>Enabling SSI for files with .html or .htm extensions can be 
     dangerous. This is especially true in a shared, or high traffic, 
@@ -143,7 +143,7 @@
     programs from SSI pages. To do this replace <code>Includes</code>
     with <code>IncludesNOEXEC</code> in the <code class="directive"><a href="../mod/core.html#options">Options</a></code> directive.  Note that users may 
     still use &lt;--#include virtual="..." --&gt; to execute CGI scripts if 
-    these scripts are in directories desginated by a <code class="directive"><a href="../mod/mod_alias.html#scriptalias">ScriptAlias</a></code> directive.</p>
+    these scripts are in directories designated by a <code class="directive"><a href="../mod/mod_alias.html#scriptalias">ScriptAlias</a></code> directive.</p>
     
   </div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
 <div class="section">
@@ -280,7 +280,7 @@
     
     <p>Pay particular attention to the interactions of <code class="directive"><a href="../mod/core.html#location">Location</a></code> and <code class="directive"><a href="../mod/core.html#directory">Directory</a></code> directives; for instance, even 
     if <code>&lt;Directory /&gt;</code> denies access, a <code>
-    &lt;Location /&gt;</code> directive might overturn it</p>
+    &lt;Location /&gt;</code> directive might overturn it.</p>
     
     <p>Also be wary of playing games with the <code class="directive"><a href="../mod/mod_userdir.html#userdir">UserDir</a></code> directive; setting it to 
     something like "./" would have the same effect, for root, as the first 

Modified: httpd/httpd/branches/2.0.x/docs/manual/misc/security_tips.xml
URL: http://svn.apache.org/viewvc/httpd/httpd/branches/2.0.x/docs/manual/misc/security_tips.xml?rev=597938&r1=597937&r2=597938&view=diff
==============================================================================
--- httpd/httpd/branches/2.0.x/docs/manual/misc/security_tips.xml (original)
+++ httpd/httpd/branches/2.0.x/docs/manual/misc/security_tips.xml Sat Nov 24 16:52:01 2007
@@ -125,7 +125,7 @@
     
     <p>To isolate the damage a wayward SSI file can cause, a server 
     administrator can enable <a href="../suexec.html">suexec</a> as 
-    described in the <a href="#cgi">CGI in General</a> section</p>
+    described in the <a href="#cgi">CGI in General</a> section.</p>
     
     <p>Enabling SSI for files with .html or .htm extensions can be 
     dangerous. This is especially true in a shared, or high traffic, 
@@ -138,7 +138,7 @@
     with <code>IncludesNOEXEC</code> in the <directive
     module="core">Options</directive> directive.  Note that users may 
     still use &lt;--#include virtual="..." --&gt; to execute CGI scripts if 
-    these scripts are in directories desginated by a <directive
+    these scripts are in directories designated by a <directive
     module="mod_alias">ScriptAlias</directive> directive.</p>
     
   </section>
@@ -279,7 +279,7 @@
     module="core">Location</directive> and <directive 
     module="core">Directory</directive> directives; for instance, even 
     if <code>&lt;Directory /&gt;</code> denies access, a <code>
-    &lt;Location /&gt;</code> directive might overturn it</p>
+    &lt;Location /&gt;</code> directive might overturn it.</p>
     
     <p>Also be wary of playing games with the <directive
     module="mod_userdir">UserDir</directive> directive; setting it to