summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorB. Watson <yalhcru@gmail.com>2016-11-06 22:33:57 -0500
committerWilly Sudiarto Raharjo <willysr@slackbuilds.org>2016-11-12 06:58:01 +0700
commitc686305688ee607fa9e73709931d7c7609a6d511 (patch)
tree4664dec33a2dc911db09f419c1cac0369505db6f
parentf7554fabdb40a8366702af43c22f8d2716afb82f (diff)
downloadslackbuilds-c686305688ee607fa9e73709931d7c7609a6d511.tar.gz
network/modsecurity-apache: Update README.
-rw-r--r--network/modsecurity-apache/README20
1 files changed, 10 insertions, 10 deletions
diff --git a/network/modsecurity-apache/README b/network/modsecurity-apache/README
index 6838c9efdd..057ac7be67 100644
--- a/network/modsecurity-apache/README
+++ b/network/modsecurity-apache/README
@@ -1,12 +1,12 @@
ModSecurity(tm) is an open source, free web application firewall (WAF)
Apache module. WAFs are deployed to establish an external security layer
-that increases security, detects and prevents attacks before they reach web
-applications. It provides protection from a range of attacks against web
-applications and allows for HTTP traffic monitoring and real-time analysis
-with little or no changes to existing infrastructure.
+that increases security, detects and prevents attacks before they reach
+web applications. It provides protection from a range of attacks against
+web applications and allows for HTTP traffic monitoring and real-time
+analysis with little or no changes to existing infrastructure.
-You can get started with ModSecurity by adding the following lines to the
-appropriate sections of Apache's main configuration file (x86
+You can get started with ModSecurity by adding the following lines
+to the appropriate sections of Apache's main configuration file (x86
architecture):
LoadModule security2_module lib/httpd/modules/mod_security2.so
@@ -14,11 +14,11 @@ LoadModule security2_module lib/httpd/modules/mod_security2.so
Include /etc/httpd/extra/modsecurity-recommended.conf
</IfModule>
-Also refer to the file /etc/httpd/crs/INSTALL for information on how to get the
-Core Rule Set (CRS) up and running.
+Also refer to the file /etc/httpd/crs/INSTALL for information on how to
+get the Core Rule Set (CRS) up and running.
-This SlackBuild will also verify the PGP signature of the package if the
-following conditions are met:
+This SlackBuild will also verify the PGP signature of the package if
+the following conditions are met:
- You have GnuPG installed
- You have the appropriate public PGP key (0xE6DFB08CE8B11277)