Symbian3/PDK/Source/GUID-B088B74A-9A6D-4C72-9069-391ECAD38514.dita
changeset 14 578be2adaf3e
parent 5 f345bda72bc4
--- a/Symbian3/PDK/Source/GUID-B088B74A-9A6D-4C72-9069-391ECAD38514.dita	Tue Jul 20 12:00:49 2010 +0100
+++ b/Symbian3/PDK/Source/GUID-B088B74A-9A6D-4C72-9069-391ECAD38514.dita	Fri Aug 13 16:47:46 2010 +0100
@@ -1,32 +1,32 @@
-<?xml version="1.0" encoding="utf-8"?>
-<!-- Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies) All rights reserved. -->
-<!-- This component and the accompanying materials are made available under the terms of the License 
-"Eclipse Public License v1.0" which accompanies this distribution, 
-and is available at the URL "http://www.eclipse.org/legal/epl-v10.html". -->
-<!-- Initial Contributors:
-    Nokia Corporation - initial contribution.
-Contributors: 
--->
-<!DOCTYPE concept
-  PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd">
-<concept id="GUID-B088B74A-9A6D-4C72-9069-391ECAD38514" xml:lang="en"><title>Communications
-security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
-<p>Mobile devices support multiple communication methods, which in turn
-sets high requirements for security. A mobile device with various connection
-methods is exposed to a large number of attackers.</p>
-<p>If you are developing a networked application, consider the following
-scenarios and determine how to recover from them:</p>
-<ul>
-<li><p>The end user may lose network connection at any time or may
-not be able to establish a connection at all.</p></li>
-<li><p>A connection may pass over a public network, which may expose
-the data if it is not encrypted during transmission.</p></li>
-<li><p>Peer-to-peer connections are vulnerable to man-in-the-middle
-attacks. To prevent this, use strong authentication and proper ciphering methods.</p>
-</li>
-</ul>
-<p>For more information about communication with a mobile device, see the <xref href="GUID-8F2D6AC8-8357-55C7-970B-CD2684BA9B04.dita">Communications
-Framework Guide</xref> section. </p>
-<p>The following aspects of communication security are covered in this
-section:</p>
+<?xml version="1.0" encoding="utf-8"?>
+<!-- Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies) All rights reserved. -->
+<!-- This component and the accompanying materials are made available under the terms of the License 
+"Eclipse Public License v1.0" which accompanies this distribution, 
+and is available at the URL "http://www.eclipse.org/legal/epl-v10.html". -->
+<!-- Initial Contributors:
+    Nokia Corporation - initial contribution.
+Contributors: 
+-->
+<!DOCTYPE concept
+  PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd">
+<concept id="GUID-B088B74A-9A6D-4C72-9069-391ECAD38514" xml:lang="en"><title>Communications
+security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
+<p>Mobile devices support multiple communication methods, which in turn
+sets high requirements for security. A mobile device with various connection
+methods is exposed to a large number of attackers.</p>
+<p>If you are developing a networked application, consider the following
+scenarios and determine how to recover from them:</p>
+<ul>
+<li><p>The end user may lose network connection at any time or may
+not be able to establish a connection at all.</p></li>
+<li><p>A connection may pass over a public network, which may expose
+the data if it is not encrypted during transmission.</p></li>
+<li><p>Peer-to-peer connections are vulnerable to man-in-the-middle
+attacks. To prevent this, use strong authentication and proper ciphering methods.</p>
+</li>
+</ul>
+<p>For more information about communication with a mobile device, see the <xref href="GUID-8F2D6AC8-8357-55C7-970B-CD2684BA9B04.dita">Communications
+Framework Guide</xref> section. </p>
+<p>The following aspects of communication security are covered in this
+section:</p>
 </conbody></concept>
\ No newline at end of file