aboutsummaryrefslogtreecommitdiff
path: root/network/modsecurity-apache
diff options
context:
space:
mode:
Diffstat (limited to 'network/modsecurity-apache')
-rw-r--r--network/modsecurity-apache/README20
1 files changed, 10 insertions, 10 deletions
diff --git a/network/modsecurity-apache/README b/network/modsecurity-apache/README
index 6838c9efdd943..057ac7be67724 100644
--- a/network/modsecurity-apache/README
+++ b/network/modsecurity-apache/README
@@ -1,12 +1,12 @@
ModSecurity(tm) is an open source, free web application firewall (WAF)
Apache module. WAFs are deployed to establish an external security layer
-that increases security, detects and prevents attacks before they reach web
-applications. It provides protection from a range of attacks against web
-applications and allows for HTTP traffic monitoring and real-time analysis
-with little or no changes to existing infrastructure.
+that increases security, detects and prevents attacks before they reach
+web applications. It provides protection from a range of attacks against
+web applications and allows for HTTP traffic monitoring and real-time
+analysis with little or no changes to existing infrastructure.
-You can get started with ModSecurity by adding the following lines to the
-appropriate sections of Apache's main configuration file (x86
+You can get started with ModSecurity by adding the following lines
+to the appropriate sections of Apache's main configuration file (x86
architecture):
LoadModule security2_module lib/httpd/modules/mod_security2.so
@@ -14,11 +14,11 @@ LoadModule security2_module lib/httpd/modules/mod_security2.so
Include /etc/httpd/extra/modsecurity-recommended.conf
</IfModule>
-Also refer to the file /etc/httpd/crs/INSTALL for information on how to get the
-Core Rule Set (CRS) up and running.
+Also refer to the file /etc/httpd/crs/INSTALL for information on how to
+get the Core Rule Set (CRS) up and running.
-This SlackBuild will also verify the PGP signature of the package if the
-following conditions are met:
+This SlackBuild will also verify the PGP signature of the package if
+the following conditions are met:
- You have GnuPG installed
- You have the appropriate public PGP key (0xE6DFB08CE8B11277)