diff options
author | Michael Kozono <mkozono@gmail.com> | 2019-07-30 00:57:38 +0000 |
---|---|---|
committer | Michael Kozono <mkozono@gmail.com> | 2019-07-30 00:57:38 +0000 |
commit | c19f013fdb28c05067adfbaea3ccc173c31f6930 (patch) | |
tree | 92cbc2164814bc45a7bf2fccea7f9507d585eb7b | |
parent | ab75e3184e0290c8d15ac9ca989cf7354a040ba1 (diff) | |
download | gitlab-ce-c19f013fdb28c05067adfbaea3ccc173c31f6930.tar.gz |
Apply suggestion to doc/security/rate_limits.md
-rw-r--r-- | doc/security/rate_limits.md | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/security/rate_limits.md b/doc/security/rate_limits.md index 0ab831939e8..0e5bdcd9c79 100644 --- a/doc/security/rate_limits.md +++ b/doc/security/rate_limits.md @@ -13,8 +13,8 @@ of a web application. For example, a simple script can make thousands of web requests per second. Whether malicious, apathetic, or just a bug, your application and infrastructure -may not be able to cope with the load (see -[Denial-of-service attack](https://en.wikipedia.org/wiki/Denial-of-service_attack)). +may not be able to cope with the load. For more details, see +[Denial-of-service attack](https://en.wikipedia.org/wiki/Denial-of-service_attack). Most cases can be mitigated by limiting the rate of requests from a single IP address. Most [brute-force attacks](https://en.wikipedia.org/wiki/Brute-force_attack) are |