aboutsummaryrefslogtreecommitdiffhomepage
path: root/doc
diff options
context:
space:
mode:
authorWilli Eggeling <mail@wje-online.de>2017-08-26 11:27:18 +0200
committerWilli Eggeling <mail@wje-online.de>2017-08-26 11:27:18 +0200
commit94c035ff717c4c836bb76109b013ffaa78f64ef1 (patch)
treef78c178d2e84253cecb8387a4c33514331939692 /doc
parentde901736a663934c1b67f09f1d586da665f0f036 (diff)
downloadShaarli-94c035ff717c4c836bb76109b013ffaa78f64ef1.tar.gz
Shaarli-94c035ff717c4c836bb76109b013ffaa78f64ef1.tar.zst
Shaarli-94c035ff717c4c836bb76109b013ffaa78f64ef1.zip
removed doc and code references to magic quotes
- removed all references to magic quotes - magic quotes are not supported on PHP >= 5.4 (https://secure.php.net/manual/en/security.magicquotes.php) - Shaarli does not support PHP < 5.5
Diffstat (limited to 'doc')
-rw-r--r--doc/md/Security.md3
1 files changed, 0 insertions, 3 deletions
diff --git a/doc/md/Security.md b/doc/md/Security.md
index 36f629af..65db4225 100644
--- a/doc/md/Security.md
+++ b/doc/md/Security.md
@@ -1,9 +1,6 @@
1## Client browser 1## Client browser
2- Shaarli relies on `HTTP_REFERER` for some functions (like redirects and clicking on tags). If you have disabled or masqueraded `HTTP_REFERER` in your browser, some features of Shaarli may not work 2- Shaarli relies on `HTTP_REFERER` for some functions (like redirects and clicking on tags). If you have disabled or masqueraded `HTTP_REFERER` in your browser, some features of Shaarli may not work
3 3
4## PHP
5- `magic_quotes` is an horrible option of PHP which is often activated on servers. No serious developer should rely on this horror to secure their code against SQL injections. You should disable it (and Shaarli expects this option to be disabled). Nevertheless, I have added code to cope with `magic_quotes` on, so you should not be bothered even on crappy hosts.
6
7## Server and sessions 4## Server and sessions
8- Directories are protected using `.htaccess` files 5- Directories are protected using `.htaccess` files
9- Forms are protected against XSRF (Cross-site requests forgery): 6- Forms are protected against XSRF (Cross-site requests forgery):