diff options
author | CassioMarques <cassiommc@gmail.com> | 2009-01-31 14:45:35 -0200 |
---|---|---|
committer | CassioMarques <cassiommc@gmail.com> | 2009-01-31 15:12:49 -0200 |
commit | 8e98b43db0d8defdb01ff5fef4f34846d1cdb50b (patch) | |
tree | 1b12848bdab051df197a5cf7f0eb4a6918a2f5f5 /railties/doc/guides/html/security.html | |
parent | cbf4bef492eb9e65e51019924e19346b1aba07ad (diff) | |
download | rails-8e98b43db0d8defdb01ff5fef4f34846d1cdb50b.tar.gz rails-8e98b43db0d8defdb01ff5fef4f34846d1cdb50b.tar.bz2 rails-8e98b43db0d8defdb01ff5fef4f34846d1cdb50b.zip |
Getting rid of some of the pre-existent content in the AR basics guide, adding new stuff to it.
Diffstat (limited to 'railties/doc/guides/html/security.html')
-rw-r--r-- | railties/doc/guides/html/security.html | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/railties/doc/guides/html/security.html b/railties/doc/guides/html/security.html index 371decda64..4751e9f92b 100644 --- a/railties/doc/guides/html/security.html +++ b/railties/doc/guides/html/security.html @@ -326,7 +326,7 @@ The user has his credit back. </div>
</div>
<div class="paragraph"><p>This attack focuses on fixing a user’s session id known to the attacker, and forcing the user’s browser into using this id. It is therefore not necessary for the attacker to steal the session id afterwards. Here is how this attack works:</p></div>
-<div class="olist arabic"><ol class="arabic">
+<div class="olist"><ol>
<li>
<p>
The attacker creates a valid session id: He loads the login page of the web application where he wants to fix the session, and takes the session id in the cookie from the response (see number 1 and 2 in the image).
|