diff options
| author | Rodolfo Carvalho <rhcarvalho@gmail.com> | 2014-03-02 16:00:30 +0100 |
|---|---|---|
| committer | Tim Graham <timograham@gmail.com> | 2014-03-03 08:37:17 -0500 |
| commit | 2b6436e2d5d9fdc1961b2d5b5022122afcb0703a (patch) | |
| tree | c8a2258ee3fb89c981947ef0565a761ce9fa7df8 /docs/ref/middleware.txt | |
| parent | 0d912258921a442c48d5787228db2db5af7e8fa5 (diff) | |
Fixed some typos and formatting issues in docs.
Diffstat (limited to 'docs/ref/middleware.txt')
| -rw-r--r-- | docs/ref/middleware.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/ref/middleware.txt b/docs/ref/middleware.txt index 04ee1fa89e..f5a513e9fc 100644 --- a/docs/ref/middleware.txt +++ b/docs/ref/middleware.txt @@ -84,7 +84,7 @@ GZip middleware Security researchers recently revealed that when compression techniques (including ``GZipMiddleware``) are used on a website, the site becomes exposed to a number of possible attacks. These approaches can be used to - compromise, amongst other things, Django's CSRF protection. Before using + compromise, among other things, Django's CSRF protection. Before using ``GZipMiddleware`` on your site, you should consider very carefully whether you are subject to these attacks. If you're in *any* doubt about whether you're affected, you should avoid using ``GZipMiddleware``. For more |
