diff options
author | B. Watson <yalhcru@gmail.com> | 2016-11-06 22:33:57 -0500 |
---|---|---|
committer | Willy Sudiarto Raharjo <willysr@slackbuilds.org> | 2016-11-12 06:58:01 +0700 |
commit | c686305688ee607fa9e73709931d7c7609a6d511 (patch) | |
tree | 4664dec33a2dc911db09f419c1cac0369505db6f /network/modsecurity-apache | |
parent | f7554fabdb40a8366702af43c22f8d2716afb82f (diff) |
network/modsecurity-apache: Update README.
Diffstat (limited to 'network/modsecurity-apache')
-rw-r--r-- | network/modsecurity-apache/README | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/network/modsecurity-apache/README b/network/modsecurity-apache/README index 6838c9efdd943..057ac7be67724 100644 --- a/network/modsecurity-apache/README +++ b/network/modsecurity-apache/README @@ -1,12 +1,12 @@ ModSecurity(tm) is an open source, free web application firewall (WAF) Apache module. WAFs are deployed to establish an external security layer -that increases security, detects and prevents attacks before they reach web -applications. It provides protection from a range of attacks against web -applications and allows for HTTP traffic monitoring and real-time analysis -with little or no changes to existing infrastructure. +that increases security, detects and prevents attacks before they reach +web applications. It provides protection from a range of attacks against +web applications and allows for HTTP traffic monitoring and real-time +analysis with little or no changes to existing infrastructure. -You can get started with ModSecurity by adding the following lines to the -appropriate sections of Apache's main configuration file (x86 +You can get started with ModSecurity by adding the following lines +to the appropriate sections of Apache's main configuration file (x86 architecture): LoadModule security2_module lib/httpd/modules/mod_security2.so @@ -14,11 +14,11 @@ LoadModule security2_module lib/httpd/modules/mod_security2.so Include /etc/httpd/extra/modsecurity-recommended.conf </IfModule> -Also refer to the file /etc/httpd/crs/INSTALL for information on how to get the -Core Rule Set (CRS) up and running. +Also refer to the file /etc/httpd/crs/INSTALL for information on how to +get the Core Rule Set (CRS) up and running. -This SlackBuild will also verify the PGP signature of the package if the -following conditions are met: +This SlackBuild will also verify the PGP signature of the package if +the following conditions are met: - You have GnuPG installed - You have the appropriate public PGP key (0xE6DFB08CE8B11277) |