summaryrefslogtreecommitdiff
path: root/demos/quickstart/protected/pages/Advanced/Security.page
diff options
context:
space:
mode:
authorxue <>2007-01-30 13:40:34 +0000
committerxue <>2007-01-30 13:40:34 +0000
commit459ad2db05516db0afbfce3c8a69d576761b148f (patch)
tree626082942e0d532071b3c909bb4069297e72e7e7 /demos/quickstart/protected/pages/Advanced/Security.page
parent754a1817adc493a7e0524aaca48dfa1e358a10bc (diff)
fixed broken links in quickstart.
Diffstat (limited to 'demos/quickstart/protected/pages/Advanced/Security.page')
-rw-r--r--demos/quickstart/protected/pages/Advanced/Security.page2
1 files changed, 1 insertions, 1 deletions
diff --git a/demos/quickstart/protected/pages/Advanced/Security.page b/demos/quickstart/protected/pages/Advanced/Security.page
index 3dbfe0ab..35e6c3a2 100644
--- a/demos/quickstart/protected/pages/Advanced/Security.page
+++ b/demos/quickstart/protected/pages/Advanced/Security.page
@@ -47,7 +47,7 @@ There are several countermeasures to prevent cookies from being attacked.
<ul>
<li>An application can use SSL to create a secure communication channel and only pass the authentication cookie over an HTTPS connection. Attackers are thus unable to decipher the contents in the transferred cookies.</li>
<li>Expire sessions appropriately, including all cookies and session tokens, to reduce the likelihood of being attacked.</li>
- <li>Prevent <a href="?page=Security.XSS">cross-site scripting (XSS)</a> which causes arbitrary code to run in a user's browser and expose his cookies.</li>
+ <li>Prevent cross-site scripting (XSS) which causes arbitrary code to run in a user's browser and expose his cookies.</li>
<li>Validate cookie data and detect if they are altered.</li>
</ul>
<p>