aboutsummaryrefslogtreecommitdiffstats
path: root/railties/guides/source/security.textile
diff options
context:
space:
mode:
authorXavier Noria <fxn@hashref.com>2009-03-15 10:42:34 +0100
committerXavier Noria <fxn@hashref.com>2009-03-15 10:42:34 +0100
commita86be917b5b5abf3b511a743f7fd4ec2eac32bbe (patch)
tree0e9eb054829e86473c6a12b98a2cae78bbd876b2 /railties/guides/source/security.textile
parent1c53b5c71a94cc1c182f9ef56c8169d4c6a0c475 (diff)
downloadrails-a86be917b5b5abf3b511a743f7fd4ec2eac32bbe.tar.gz
rails-a86be917b5b5abf3b511a743f7fd4ec2eac32bbe.tar.bz2
rails-a86be917b5b5abf3b511a743f7fd4ec2eac32bbe.zip
fixes broken links in security guide
Diffstat (limited to 'railties/guides/source/security.textile')
-rw-r--r--railties/guides/source/security.textile2
1 files changed, 1 insertions, 1 deletions
diff --git a/railties/guides/source/security.textile b/railties/guides/source/security.textile
index adb96fa19c..5ab88c4942 100644
--- a/railties/guides/source/security.textile
+++ b/railties/guides/source/security.textile
@@ -23,7 +23,7 @@ The Gartner Group however estimates that 75% of attacks are at the web applicati
The threats against web applications include user account hijacking, bypass of access control, reading or modifying sensitive data, or presenting fraudulent content. Or an attacker might be able to install a Trojan horse program or unsolicited e-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources. In order to prevent attacks, minimize their impact and remove points of attack, first of all, you have to fully understand the attack methods in order to find the correct countermeasures. That is what this guide aims at.
-In order to develop secure web applications you have to keep up to date on all layers and know your enemies. To keep up to date subscribe to security mailing lists, read security blogs and make updating and security checks a habit (check the <a href="#additionalresources">Additional Resources</a> chapter). I do it manually because that‘s how you find the nasty logical security problems.
+In order to develop secure web applications you have to keep up to date on all layers and know your enemies. To keep up to date subscribe to security mailing lists, read security blogs and make updating and security checks a habit (check the <a href="#additional-resources">Additional Resources</a> chapter). I do it manually because that‘s how you find the nasty logical security problems.
h3. Sessions