Examples of Protection
TWO IMPORTANT NOTES:
- All protection setup must be placed before any
Pass rules in the configuration file. Otherwise the
protection is ignored!
- The URLs matched in the protection setup are the
requested URL, that is, what the client sends to the server -
not where the files are on the local file system!
email@example.com, July 1995