What's stopping malicious tampering occurring to the Jetty instance
itself, bypassing any configuration changes that might be made?
As Jan mentioned, this is something to address at the OS level - you
prevent users from modifying files by not giving them modify permission
to that file.
_______________________________________________
jetty-users mailing list
[email protected]
To change your delivery options, retrieve your password, or unsubscribe from
this list, visit
https://www.eclipse.org/mailman/listinfo/jetty-users