minor presentational fixes

This commit is contained in:
Pete Cooper 2020-12-29 18:20:35 +00:00 committed by Léo Colombaro
parent f0b3fd25ce
commit 654f1aa49c
6 changed files with 9 additions and 9 deletions

View File

@ -2,7 +2,7 @@
# | Default behavior for unknown hosts | # | Default behavior for unknown hosts |
# ---------------------------------------------------------------------- # ----------------------------------------------------------------------
# #
# Drop requests for unknown hosts # Drop requests for unknown hosts.
# #
# If no default server is defined, Nginx will use the first found server. # If no default server is defined, Nginx will use the first found server.
# To prevent host header attacks, or other potential problems when an unknown # To prevent host header attacks, or other potential problems when an unknown

View File

@ -2,7 +2,7 @@
# | Default behavior for unknown hosts | # | Default behavior for unknown hosts |
# ---------------------------------------------------------------------- # ----------------------------------------------------------------------
# #
# Drop requests for unknown hosts # Drop requests for unknown hosts.
# #
# If no default server is defined, Nginx will use the first found server. # If no default server is defined, Nginx will use the first found server.
# To prevent host header attacks, or other potential problems when an unknown # To prevent host header attacks, or other potential problems when an unknown

View File

@ -5,7 +5,7 @@
# Mitigate the risk of cross-site scripting and other content-injection # Mitigate the risk of cross-site scripting and other content-injection
# attacks. # attacks.
# #
# This can be done by setting a `Content Security Policy` which whitelists # This can be done by setting a Content Security Policy which permits
# trusted sources of content for your website. # trusted sources of content for your website.
# #
# There is no policy that fits all websites, you will have to modify the # There is no policy that fits all websites, you will have to modify the

View File

@ -8,9 +8,9 @@
# web browsers. # web browsers.
# #
# The filter is usually enabled by default, but in some cases, it may be # The filter is usually enabled by default, but in some cases, it may be
# disabled by the user. However, in Internet Explorer, for example, it can be # disabled by the user. However, in Internet Explorer, for example, it can
# re-enabled just by sending the `X-XSS-Protection` header with the value # be re-enabled just by sending the `X-XSS-Protection` header with the
# of `1`. # value of `1`.
# #
# (2) Prevent web browsers from rendering the web page if a potential reflected # (2) Prevent web browsers from rendering the web page if a potential reflected
# (a.k.a non-persistent) XSS attack is detected by the filter. # (a.k.a non-persistent) XSS attack is detected by the filter.

View File

@ -8,7 +8,7 @@
# users of IE 8 and below on WinXP can see your main site without SSL errors. # users of IE 8 and below on WinXP can see your main site without SSL errors.
# #
# (1) Certificate and key files location # (1) Certificate and key files location
# The certificate file can contain intermediate certificate. # The certificate file can contain an intermediate certificate.
# #
# https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_certificate # https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_certificate
# #
@ -17,7 +17,7 @@
# #
# https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_trusted_certificate # https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_trusted_certificate
# #
# (3) CA certificate file location for client certificate authentication # (3) CA certificate file location for client certificate authentication.
# #
# https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_client_certificate # https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_client_certificate

View File

@ -8,7 +8,7 @@
# (!) To make this part relevant, you need to generate encoded files by your # (!) To make this part relevant, you need to generate encoded files by your
# own. Enabling this part will not auto-generate brotlied files. # own. Enabling this part will not auto-generate brotlied files.
# #
# Note that some clients (eg. browsers) require a secure connection to request # Note that some clients (e.g. browsers) require a secure connection to request
# brotli-compressed resources. # brotli-compressed resources.
# https://www.chromestatus.com/feature/5420797577396224 # https://www.chromestatus.com/feature/5420797577396224
# #