Fixed ReadMe typo and added .gitignore.
This commit is contained in:
parent
eceae7187a
commit
673c881559
|
@ -0,0 +1,5 @@
|
|||
# files (especially tests) to be ignored until a subsequent release for security
|
||||
**/embargoed/**
|
||||
# build artifacts
|
||||
xpi
|
||||
*.xpi
|
|
@ -1,4 +1,4 @@
|
|||
#NoScript Security Suite
|
||||
# NoScript Security Suite
|
||||
|
||||
The best security you can get in a web browser!
|
||||
Allow active content to run only from sites you trust, and protect yourself against XSS and Clickjacking attacks, "Spectre", "Meltdown" and other JavaScript exploits.
|
||||
|
@ -15,10 +15,10 @@ Winner of the "PC World World Class Award" and bundled with the Tor Browser, NoS
|
|||
|
||||
It allows JavaScript, Flash, Java and other executable content to run only from trusted domains of your choice, e.g. your home-banking site, mitigating remotely exploitable vulnerabilities including Spectre and Meltdown.
|
||||
|
||||
It protects your "trust boundaries" against cross-site scripting attacks (XSS), cross-zone DNS rebinding / CSRF attacks (router hacking), and Clickjacking attempts, thanks to its unique ClearClick technology.
|
||||
It protects your "trust boundaries" against cross-site scripting attacks (XSS), cross-zone DNS rebinding / CSRF attacks (router hacking), and Clickjacking attempts, thanks to its unique ClearClick technology.
|
||||
|
||||
Such a preemptive approach prevents exploitation of security vulnerabilities (known and even unknown!) with no loss of functionality where you need it.
|
||||
Experts do agree: Firefox is really safer with NoScript ;-)
|
||||
|
||||
FAQ: <a href="https://noscript.net/faq">https://noscript.net/faq</a>
|
||||
Forum: <a href="https://noscript.net/forum">https://noscript.net/forum</a>
|
||||
Forum: <a href="https://noscript.net/forum">https://noscript.net/forum</a>
|
||||
|
|
Loading…
Reference in New Issue