@@ -378,22 +378,24 @@ AddDefaultCharset utf-8
378
378
</FilesMatch >
379
379
380
380
# ------------------------------------------------------------------------------
381
- # | Reducing MIME- type security risks |
381
+ # | Reducing MIME type security risks |
382
382
# ------------------------------------------------------------------------------
383
383
384
384
# Prevent some browsers from MIME-sniffing the response.
385
385
386
- # This reduces exposure to drive-by download attacks and should be enable
387
- # especially if the web server is serving user uploaded content, content
388
- # that could potentially be treated by the browser as executable.
386
+ # This reduces exposure to drive-by download attacks and cross-origin data
387
+ # leaks, and should be left uncommented, especially if the web server is
388
+ # serving user-uploaded content or content that could potentially be treated
389
+ # as executable by the browser.
389
390
391
+ # http://www.slideshare.net/hasegawayosuke/owasp-hasegawa
390
392
# http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-v-comprehensive-protection.aspx
391
393
# http://msdn.microsoft.com/en-us/library/ie/gg622941.aspx
392
394
# http://mimesniff.spec.whatwg.org/
393
395
394
- # <IfModule mod_headers.c>
395
- # Header set X-Content-Type-Options "nosniff"
396
- # </IfModule>
396
+ <IfModule mod_headers.c >
397
+ Header set X-Content-Type-Options "nosniff"
398
+ </IfModule >
397
399
398
400
# ------------------------------------------------------------------------------
399
401
# | Reflected Cross-Site Scripting (XSS) attacks |
0 commit comments