Talk:Web application firewall
Appearance
This is the talk page for discussing improvements to the Web application firewall article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
![]() | Computing: Networking / Software / Security Start‑class Mid‑importance | ||||||||||||||||||||||||||
|
XSS protection bypass
I'm not good at editing wiki, but I want to help include that WAF's XSS protection is not sufficient. It's really easy to evade the XSS protection.[[1]][[2]]
- i have been trying to set time aside finish up a rework on the main section of this article. i think it could be nice to include that, but i dont think it should be mentioned in the description as that should be more general and easy for people to understand. additional sections going over that would be pretty awesome though. one thing to note is that we need to provide the information in the article itself. it shouldn't force the reader to have to leave the page to read what is mentioned. essentially just stating that it can be bypassed and not how its bypassed isn't very useful [imo]. I'm going to revert the change, but if you want, please suggest a change here so we can talk see where it would fit. also, please sign your comments with the 4 tildes so everyone knows who said what.StayFree76 talk 00:53, 10 September 2020 (UTC)
Categories:
- Start-Class Computing articles
- Mid-importance Computing articles
- Start-Class Computer networking articles
- Mid-importance Computer networking articles
- Start-Class Computer networking articles of Mid-importance
- All Computer networking articles
- Start-Class software articles
- Low-importance software articles
- Start-Class software articles of Low-importance
- All Software articles
- Start-Class Computer hardware articles
- Low-importance Computer hardware articles
- Start-Class Computer hardware articles of Low-importance
- Start-Class Computer security articles
- Mid-importance Computer security articles
- Start-Class Computer security articles of Mid-importance
- All Computer security articles
- All Computing articles