diff options
author | xue <> | 2007-01-30 13:40:34 +0000 |
---|---|---|
committer | xue <> | 2007-01-30 13:40:34 +0000 |
commit | 459ad2db05516db0afbfce3c8a69d576761b148f (patch) | |
tree | 626082942e0d532071b3c909bb4069297e72e7e7 | |
parent | 754a1817adc493a7e0524aaca48dfa1e358a10bc (diff) |
fixed broken links in quickstart.
-rw-r--r-- | demos/quickstart/protected/pages/Advanced/Security.page | 2 | ||||
-rw-r--r-- | demos/quickstart/protected/pages/Controls/Standard.page | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/demos/quickstart/protected/pages/Advanced/Security.page b/demos/quickstart/protected/pages/Advanced/Security.page index 3dbfe0ab..35e6c3a2 100644 --- a/demos/quickstart/protected/pages/Advanced/Security.page +++ b/demos/quickstart/protected/pages/Advanced/Security.page @@ -47,7 +47,7 @@ There are several countermeasures to prevent cookies from being attacked. <ul>
<li>An application can use SSL to create a secure communication channel and only pass the authentication cookie over an HTTPS connection. Attackers are thus unable to decipher the contents in the transferred cookies.</li>
<li>Expire sessions appropriately, including all cookies and session tokens, to reduce the likelihood of being attacked.</li>
- <li>Prevent <a href="?page=Security.XSS">cross-site scripting (XSS)</a> which causes arbitrary code to run in a user's browser and expose his cookies.</li>
+ <li>Prevent cross-site scripting (XSS) which causes arbitrary code to run in a user's browser and expose his cookies.</li>
<li>Validate cookie data and detect if they are altered.</li>
</ul>
<p>
diff --git a/demos/quickstart/protected/pages/Controls/Standard.page b/demos/quickstart/protected/pages/Controls/Standard.page index 086ba293..20342fb9 100644 --- a/demos/quickstart/protected/pages/Controls/Standard.page +++ b/demos/quickstart/protected/pages/Controls/Standard.page @@ -100,7 +100,7 @@ </li>
<li>
- <a href="?page=Controls.SafeHtml">TSafeHtml</a> displays its body content with assurance that the content contain no harmful code (such as <a href="?page=Security.XSS">XSS</a>).
+ <a href="?page=Controls.SafeHtml">TSafeHtml</a> displays its body content with assurance that the content contain no harmful code (such as <a href="?page=Advanced.Security">XSS</a>).
</li>
<li>
|