From 1024b5e74a7166313ad4e4975a15e90dccd3ec5f Mon Sep 17 00:00:00 2001 From: David Smith Date: Fri, 23 Jul 2021 07:48:16 +0100 Subject: Fixed 32956 -- Lowercased spelling of "web" and "web framework" where appropriate. --- docs/ref/templates/api.txt | 2 +- docs/ref/templates/language.txt | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) (limited to 'docs/ref/templates') diff --git a/docs/ref/templates/api.txt b/docs/ref/templates/api.txt index 01748715b7..7e9812fffb 100644 --- a/docs/ref/templates/api.txt +++ b/docs/ref/templates/api.txt @@ -805,7 +805,7 @@ directories:: ] Your templates can go anywhere you want, as long as the directories and -templates are readable by the Web server. They can have any extension you want, +templates are readable by the web server. They can have any extension you want, such as ``.html`` or ``.txt``, or they can have no extension at all. Note that these paths should use Unix-style forward slashes, even on Windows. diff --git a/docs/ref/templates/language.txt b/docs/ref/templates/language.txt index 04b363c0cf..ffddd7435a 100644 --- a/docs/ref/templates/language.txt +++ b/docs/ref/templates/language.txt @@ -471,10 +471,10 @@ That would result in a rendered template like this:: Hello, username -...which, in turn, would result in the remainder of the Web page being bolded! +...which, in turn, would result in the remainder of the web page being bolded! Clearly, user-submitted data shouldn't be trusted blindly and inserted directly -into your Web pages, because a malicious user could use this kind of hole to +into your web pages, because a malicious user could use this kind of hole to do potentially bad things. This type of security exploit is called a `Cross Site Scripting`_ (XSS) attack. -- cgit v1.3