You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by sl...@apache.org on 2006/01/17 18:03:08 UTC
svn commit: r369837 - in /httpd/httpd/trunk/docs/manual/misc:
security_tips.html.en security_tips.xml security_tips.xml.ko
Author: slive
Date: Tue Jan 17 09:03:03 2006
New Revision: 369837
URL: http://svn.apache.org/viewcvs?rev=369837&view=rev
Log:
Fix typos.
Modified:
httpd/httpd/trunk/docs/manual/misc/security_tips.html.en
httpd/httpd/trunk/docs/manual/misc/security_tips.xml
httpd/httpd/trunk/docs/manual/misc/security_tips.xml.ko
Modified: httpd/httpd/trunk/docs/manual/misc/security_tips.html.en
URL: http://svn.apache.org/viewcvs/httpd/httpd/trunk/docs/manual/misc/security_tips.html.en?rev=369837&r1=369836&r2=369837&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/misc/security_tips.html.en (original)
+++ httpd/httpd/trunk/docs/manual/misc/security_tips.html.en Tue Jan 17 09:03:03 2006
@@ -64,7 +64,7 @@
- <p>All network servers can be subject to denial of service atacks
+ <p>All network servers can be subject to denial of service attacks
that attempt to prevent responses to clients by tying up the
resources of the server. It is not possible to prevent such
attacks entirely, but you can do certain things to mitigate the
@@ -90,7 +90,7 @@
<li>The directives
<code class="directive"><a href="../mod/core.html#limitrequestbody">LimitRequestBody</a></code>,
<code class="directive"><a href="../mod/core.html#limitrequestfields">LimitRequestFields</a></code>,
- <code class="directive"><a href="../mod/core.html#limitrequestfilesize">LimitRequestFileSize</a></code>,
+ <code class="directive"><a href="../mod/core.html#limitrequestfieldsize">LimitRequestFieldSize</a></code>,
<code class="directive"><a href="../mod/core.html#limitrequestline">LimitRequestLine</a></code>, and
<code class="directive"><a href="../mod/core.html#limitxmlrequestbody">LimitXMLRequestBody</a></code>
should be carefully configured to limit resource consumption
Modified: httpd/httpd/trunk/docs/manual/misc/security_tips.xml
URL: http://svn.apache.org/viewcvs/httpd/httpd/trunk/docs/manual/misc/security_tips.xml?rev=369837&r1=369836&r2=369837&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/misc/security_tips.xml (original)
+++ httpd/httpd/trunk/docs/manual/misc/security_tips.xml Tue Jan 17 09:03:03 2006
@@ -56,7 +56,7 @@
<title>Denial of Service (DoS) attacks</title>
- <p>All network servers can be subject to denial of service atacks
+ <p>All network servers can be subject to denial of service attacks
that attempt to prevent responses to clients by tying up the
resources of the server. It is not possible to prevent such
attacks entirely, but you can do certain things to mitigate the
@@ -82,7 +82,7 @@
<li>The directives
<directive module="core">LimitRequestBody</directive>,
<directive module="core">LimitRequestFields</directive>,
- <directive module="core">LimitRequestFileSize</directive>,
+ <directive module="core">LimitRequestFieldSize</directive>,
<directive module="core">LimitRequestLine</directive>, and
<directive module="core">LimitXMLRequestBody</directive>
should be carefully configured to limit resource consumption
Modified: httpd/httpd/trunk/docs/manual/misc/security_tips.xml.ko
URL: http://svn.apache.org/viewcvs/httpd/httpd/trunk/docs/manual/misc/security_tips.xml.ko?rev=369837&r1=369836&r2=369837&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/misc/security_tips.xml.ko [euc-kr] (original)
+++ httpd/httpd/trunk/docs/manual/misc/security_tips.xml.ko [euc-kr] Tue Jan 17 09:03:03 2006
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="EUC-KR" ?>
<!DOCTYPE manualpage SYSTEM "../style/manualpage.dtd">
<?xml-stylesheet type="text/xsl" href="../style/manual.ko.xsl"?>
-<!-- English Revision: 105989:369829 (outdated) -->
+<!-- English Revision: 105989:369835 (outdated) -->
<!--
Copyright 2004-2005 The Apache Software Foundation or its licensors,