Skip to content

Commit 3b04ec2

Browse files
committed
Update Blog 5.5 - Revealing Sensitive Data.md
Fixed typos and minor wording change
1 parent 73e66cb commit 3b04ec2

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

Blog 5.5 - Revealing Sensitive Data.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -29,15 +29,15 @@ There are some other pages that allow for arbitrary queries to be run. The page
2929

3030
As it turns out there is a good reason not everybody is a programmer: it is pretty hard to get right.
3131

32-
A> There is a constant struggle to build tools for reporting that are so simple the average user can use them and so powerful that they provide real value. I've seen a lot of these tools come and go over the years. It is an impossible balence to strike. The only tool I've ever seen that even comes close is Microsoft Excel. All my applications just export to Excel to allow users to do whatever crazy things users do.
32+
A> There is a constant struggle to build tools for reporting that are so simple the average user can use them and so powerful that they provide real value. I've seen a lot of these tools come and go over the years. It is an impossible balance to strike. The only tool I've ever seen that even comes close is Microsoft Excel. All my applications just export to Excel to allow users to do whatever crazy things users do.
3333

34-
Let's take the ability to edit queries but leave intact the actual query functionality. This means that people can still create the queries on the back end should they be needed.
34+
Let's take away the ability to edit queries but leave intact the actual query functionality. This means that people can still create the queries on the back end should they be needed.
3535

3636
[View the Commit](https://github.com/dpaquette/BugTracker.NET/commit/0b339846d85e948714e730c12ea16ba14daea8a6)
3737

3838
##Web Config
3939

40-
The final item of concern is the web.config file. Typically the web config is a well guarded secret. It contains applicaiton setting such as the connection string and encryption keys. There is a tool provided to allow editing of the web config file from within the tool. This is dangerous not only for security reasons but if an incorrect configuration is entered the application may no longer work to allow the change to be reverted.
40+
The final item of concern is the web.config file. Typically the web config is a well guarded secret. It contains application setting such as the connection string and encryption keys. There is a tool provided to allow editing of the web config file from within the tool. This is dangerous not only for security reasons but if an incorrect configuration is entered the application may no longer work to allow the change to be reverted.
4141

4242
![Web.confg](Images/webconfig.jpg)
4343

0 commit comments

Comments
 (0)