Skip to content

Commit eb1cacc

Browse files
authoredJun 9, 2025
Merge pull request #5380 from Rageking8/add-missing-escapes-and-clean-up-a-few-topics
Add missing escapes and clean up a few topics
2 parents 101ed8a + 01ef9c3 commit eb1cacc

File tree

3 files changed

+22
-23
lines changed

3 files changed

+22
-23
lines changed
 

‎docs/build/reference/msbuild-reference-cpp.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
description: "Learn more about: MSBuild reference for C++ projects"
32
title: "MSBuild reference for C++ projects in Visual Studio"
4-
ms.date: "12/08/2018"
3+
description: "Learn more about: MSBuild reference for C++ projects"
4+
ms.date: 12/08/2018
55
helpviewer_keywords: ["MSBuild reference [C++]"]
66
---
77
# MSBuild reference for C++ projects
@@ -12,25 +12,25 @@ If for some reason you wish to use MSBuild directly from the command line, see [
1212

1313
## In this section
1414

15-
[MSBuild internals for C++ projects](msbuild-visual-cpp-overview.md)<br/>
15+
[MSBuild internals for C++ projects](msbuild-visual-cpp-overview.md)\
1616
Information about how properties and targets are stored and consumed.
1717

18-
[Common macros for build commands and properties](common-macros-for-build-commands-and-properties.md)<br/>
18+
[Common macros for build commands and properties](common-macros-for-build-commands-and-properties.md)\
1919
Describes macros (compile-time constants) that can be used to define properties such as paths and product versions.
2020

21-
[File types created for C++ projects](file-types-created-for-visual-cpp-projects.md)<br/>
21+
[File types created for C++ projects](file-types-created-for-visual-cpp-projects.md)\
2222
Describes the various kinds of files that Visual Studio creates for different project types.
2323

24-
[Visual Studio C++ project templates](visual-cpp-project-types.md)<br>
24+
[Visual Studio C++ project templates](visual-cpp-project-types.md)\
2525
Describes the MSBuild-based project types that are available for C++.
2626

27-
[C++ new item templates](using-visual-cpp-add-new-item-templates.md)<br>
27+
[C++ new item templates](using-visual-cpp-add-new-item-templates.md)\
2828
Describes source files and other items you can add to a Visual Studio project.
2929

30-
[Precompiled header files](../creating-precompiled-header-files.md)
30+
[Precompiled header files](../creating-precompiled-header-files.md)\
3131
How to use precompiled header files and how to create your own custom precompiled code to speed up build times.
3232

33-
[Visual Studio project property reference](property-pages-visual-cpp.md)<br/>
33+
[Visual Studio project property reference](property-pages-visual-cpp.md)\
3434
Reference documentation for project properties that are set in the Visual Studio IDE.
3535

3636
## See also

‎docs/cpp/c-cpp-language-and-standard-libraries.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
description: "Learn more about: C/C++ language and standard libraries reference"
32
title: "C/C++ language and standard libraries reference"
3+
description: "Learn more about: C/C++ language and standard libraries reference"
44
ms.date: 09/11/2024
55
ms.topic: "overview"
66
ms.custom: intro-overview
@@ -16,7 +16,7 @@ You'll also find documentation for the C runtime library, the C++ standard libra
1616
[C language](../c-language/c-language-reference.md)\
1717
Reference content for the Microsoft implementation of the C language.
1818

19-
[C++ language](../cpp/cpp-language-reference.md)\
19+
[C++ language](cpp-language-reference.md)\
2020
Reference content for the Microsoft implementation of the C++ language.
2121

2222
[C/C++ preprocessor](../preprocessor/c-cpp-preprocessor-reference.md)\
@@ -66,7 +66,7 @@ A header-only C++20 library for using polymorphism in C++ without inheritance. F
6666
[SafeInt library](../safeint/safeint-library.md)\
6767
A portable library that can be used with MSVC, GCC, or Clang to help prevent integer overflows.
6868

69-
[Data Access Libraries](../data/data-access-in-cpp.md)
69+
[Data Access Libraries](../data/data-access-in-cpp.md)\
7070
Libraries to support data access using ATL or MFC, and legacy services such as OLE DB and ODBC.
7171

7272
## Related articles

‎docs/security/security-best-practices-for-cpp.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,9 @@
11
---
2-
description: "Learn more about: Security Best Practices for C++"
32
title: "Security Best Practices for C++"
4-
ms.date: "05/08/2018"
3+
description: "Learn more about: Security Best Practices for C++"
4+
ms.date: 05/08/2018
55
f1_keywords: ["securitybestpracticesVC"]
66
helpviewer_keywords: ["Visual C++, security", "security [C++]", "security [C++], best practices"]
7-
ms.assetid: 86acaccf-cdb4-4517-bd58-553618e3ec42
87
---
98
# Security Best Practices for C++
109

@@ -14,22 +13,22 @@ This article contains information about security tools and practices. Using them
1413

1514
These security features are built into the Microsoft C++ compiler and linker:
1615

17-
[`/guard` (Enable Control Flow Guard)](../build/reference/guard-enable-control-flow-guard.md)<br/>
16+
[`/guard` (Enable Control Flow Guard)](../build/reference/guard-enable-control-flow-guard.md)\
1817
Causes the compiler to analyze control flow for indirect call targets at compile time, and then to insert code to verify the targets at runtime.
1918

20-
[`/GS` (Buffer Security Check)](../build/reference/gs-buffer-security-check.md)<br/>
19+
[`/GS` (Buffer Security Check)](../build/reference/gs-buffer-security-check.md)\
2120
Instructs the compiler to insert overrun detection code into functions that are at risk of being exploited. When an overrun is detected, execution is stopped. By default, this option is on.
2221

23-
[`/SAFESEH` (Image has Safe Exception Handlers)](../build/reference/safeseh-image-has-safe-exception-handlers.md)<br/>
22+
[`/SAFESEH` (Image has Safe Exception Handlers)](../build/reference/safeseh-image-has-safe-exception-handlers.md)\
2423
Instructs the linker to include in the output image a table that contains the address of each exception handler. At run time, the operating system uses this table to make sure that only legitimate exception handlers are executed. This helps prevent the execution of exception handlers that are introduced by a malicious attack at run time. By default, this option is off.
2524

26-
[`/NXCOMPAT`](../build/reference/nxcompat.md), [`/NXCOMPAT` (Compatible with Data Execution Prevention)](../build/reference/nxcompat-compatible-with-data-execution-prevention.md)
25+
[`/NXCOMPAT`](../build/reference/nxcompat.md), [`/NXCOMPAT` (Compatible with Data Execution Prevention)](../build/reference/nxcompat-compatible-with-data-execution-prevention.md)\
2726
These compiler and linker options enable Data Execution Prevention (DEP) compatibility. DEP guards the CPU against the execution of non-code pages.
2827

29-
[`/analyze` (Code Analysis)](../build/reference/analyze-code-analysis.md)<br/>
28+
[`/analyze` (Code Analysis)](../build/reference/analyze-code-analysis.md)\
3029
This compiler option activates code analysis that reports potential security issues such as buffer overrun, un-initialized memory, null pointer dereferencing, and memory leaks. By default, this option is off. For more information, see [Code Analysis for C/C++ Overview](../code-quality/code-analysis-for-c-cpp-overview.md).
3130

32-
[`/DYNAMICBASE` (Use address space layout randomization)](../build/reference/dynamicbase-use-address-space-layout-randomization.md)<br/>
31+
[`/DYNAMICBASE` (Use address space layout randomization)](../build/reference/dynamicbase-use-address-space-layout-randomization.md)\
3332
This linker option enables the building of an executable image that can be loaded at different locations in memory at the beginning of execution. This option also makes the stack location in memory much less predictable.
3433

3534
## Security-Enhanced CRT
@@ -86,6 +85,6 @@ For information about how to indentify and mitigate against speculative executio
8685

8786
## See also
8887

89-
<xref:System.Security> <br/>
90-
[Security](/dotnet/standard/security/index)<br/>
88+
<xref:System.Security>\
89+
[Security in .NET](/dotnet/standard/security/index)\
9190
[How User Account Control (UAC) Affects Your Application](how-user-account-control-uac-affects-your-application.md)

0 commit comments

Comments
 (0)