Nice ;)

By the way, maybe you should implement a "SecEncryptionSecondaryKey" directive in order to assure smooth transition when the key is changed, otherwise, all urls and forms generated with the previous key will be invalid.


On Tue, Jul 24, 2012 at 6:20 PM, Breno Silva <> wrote:
Hello all,

FYI - We posted a new blog post



Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
mod-security-users mailing list
Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: