diff options
author | Hannes Fostie <hannes@openminds.be> | 2013-09-09 09:43:58 +0200 |
---|---|---|
committer | Hannes Fostie <hannes@openminds.be> | 2013-09-09 09:43:58 +0200 |
commit | 84cea5a6d140fe1f855b925ceb8df4dd5a8ae557 (patch) | |
tree | da28e781f9397e0fd3c2e5c8c01b2e735260952a /guides/source | |
parent | 638adfc447609f498ac1461886507110704f4638 (diff) | |
download | rails-84cea5a6d140fe1f855b925ceb8df4dd5a8ae557.tar.gz rails-84cea5a6d140fe1f855b925ceb8df4dd5a8ae557.tar.bz2 rails-84cea5a6d140fe1f855b925ceb8df4dd5a8ae557.zip |
Improves a sentence in guides/security
Changed "... books make this wrong" to "... books get this wrong"
Diffstat (limited to 'guides/source')
-rw-r--r-- | guides/source/security.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/guides/source/security.md b/guides/source/security.md index 97b7355771..4aba39f55a 100644 --- a/guides/source/security.md +++ b/guides/source/security.md @@ -481,7 +481,7 @@ A good password is a long alphanumeric combination of mixed cases. As this is qu INFO: _A common pitfall in Ruby's regular expressions is to match the string's beginning and end by ^ and $, instead of \A and \z._ -Ruby uses a slightly different approach than many other languages to match the end and the beginning of a string. That is why even many Ruby and Rails books make this wrong. So how is this a security threat? Say you wanted to loosely validate a URL field and you used a simple regular expression like this: +Ruby uses a slightly different approach than many other languages to match the end and the beginning of a string. That is why even many Ruby and Rails books get this wrong. So how is this a security threat? Say you wanted to loosely validate a URL field and you used a simple regular expression like this: ```ruby /^https?:\/\/[^\n]+$/i |