summaryrefslogtreecommitdiff
path: root/demos
diff options
context:
space:
mode:
authorxue <>2007-01-30 13:40:34 +0000
committerxue <>2007-01-30 13:40:34 +0000
commit459ad2db05516db0afbfce3c8a69d576761b148f (patch)
tree626082942e0d532071b3c909bb4069297e72e7e7 /demos
parent754a1817adc493a7e0524aaca48dfa1e358a10bc (diff)
fixed broken links in quickstart.
Diffstat (limited to 'demos')
-rw-r--r--demos/quickstart/protected/pages/Advanced/Security.page2
-rw-r--r--demos/quickstart/protected/pages/Controls/Standard.page2
2 files changed, 2 insertions, 2 deletions
diff --git a/demos/quickstart/protected/pages/Advanced/Security.page b/demos/quickstart/protected/pages/Advanced/Security.page
index 3dbfe0ab..35e6c3a2 100644
--- a/demos/quickstart/protected/pages/Advanced/Security.page
+++ b/demos/quickstart/protected/pages/Advanced/Security.page
@@ -47,7 +47,7 @@ There are several countermeasures to prevent cookies from being attacked.
<ul>
<li>An application can use SSL to create a secure communication channel and only pass the authentication cookie over an HTTPS connection. Attackers are thus unable to decipher the contents in the transferred cookies.</li>
<li>Expire sessions appropriately, including all cookies and session tokens, to reduce the likelihood of being attacked.</li>
- <li>Prevent <a href="?page=Security.XSS">cross-site scripting (XSS)</a> which causes arbitrary code to run in a user's browser and expose his cookies.</li>
+ <li>Prevent cross-site scripting (XSS) which causes arbitrary code to run in a user's browser and expose his cookies.</li>
<li>Validate cookie data and detect if they are altered.</li>
</ul>
<p>
diff --git a/demos/quickstart/protected/pages/Controls/Standard.page b/demos/quickstart/protected/pages/Controls/Standard.page
index 086ba293..20342fb9 100644
--- a/demos/quickstart/protected/pages/Controls/Standard.page
+++ b/demos/quickstart/protected/pages/Controls/Standard.page
@@ -100,7 +100,7 @@
</li>
<li>
- <a href="?page=Controls.SafeHtml">TSafeHtml</a> displays its body content with assurance that the content contain no harmful code (such as <a href="?page=Security.XSS">XSS</a>).
+ <a href="?page=Controls.SafeHtml">TSafeHtml</a> displays its body content with assurance that the content contain no harmful code (such as <a href="?page=Advanced.Security">XSS</a>).
</li>
<li>