diff options
author | Xavier Noria <fxn@hashref.com> | 2009-03-15 10:42:34 +0100 |
---|---|---|
committer | Xavier Noria <fxn@hashref.com> | 2009-03-15 10:42:34 +0100 |
commit | a86be917b5b5abf3b511a743f7fd4ec2eac32bbe (patch) | |
tree | 0e9eb054829e86473c6a12b98a2cae78bbd876b2 /railties/guides/source/security.textile | |
parent | 1c53b5c71a94cc1c182f9ef56c8169d4c6a0c475 (diff) | |
download | rails-a86be917b5b5abf3b511a743f7fd4ec2eac32bbe.tar.gz rails-a86be917b5b5abf3b511a743f7fd4ec2eac32bbe.tar.bz2 rails-a86be917b5b5abf3b511a743f7fd4ec2eac32bbe.zip |
fixes broken links in security guide
Diffstat (limited to 'railties/guides/source/security.textile')
-rw-r--r-- | railties/guides/source/security.textile | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/railties/guides/source/security.textile b/railties/guides/source/security.textile index adb96fa19c..5ab88c4942 100644 --- a/railties/guides/source/security.textile +++ b/railties/guides/source/security.textile @@ -23,7 +23,7 @@ The Gartner Group however estimates that 75% of attacks are at the web applicati The threats against web applications include user account hijacking, bypass of access control, reading or modifying sensitive data, or presenting fraudulent content. Or an attacker might be able to install a Trojan horse program or unsolicited e-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources. In order to prevent attacks, minimize their impact and remove points of attack, first of all, you have to fully understand the attack methods in order to find the correct countermeasures. That is what this guide aims at. -In order to develop secure web applications you have to keep up to date on all layers and know your enemies. To keep up to date subscribe to security mailing lists, read security blogs and make updating and security checks a habit (check the <a href="#additionalresources">Additional Resources</a> chapter). I do it manually because that‘s how you find the nasty logical security problems. +In order to develop secure web applications you have to keep up to date on all layers and know your enemies. To keep up to date subscribe to security mailing lists, read security blogs and make updating and security checks a habit (check the <a href="#additional-resources">Additional Resources</a> chapter). I do it manually because that‘s how you find the nasty logical security problems. h3. Sessions |