Explorar o código

Fixed Security docs typo

Juan Rossi %!s(int64=9) %!d(string=hai) anos
pai
achega
0e4ac4ca80
Modificáronse 1 ficheiros con 1 adicións e 1 borrados
  1. 1 1
      docs/userguide/security.rst

+ 1 - 1
docs/userguide/security.rst

@@ -200,7 +200,7 @@ Logs are usually the first place to look for evidence
 of security breaches, but they are useless if they can be tampered with.
 
 A good solution is to set up centralized logging with a dedicated logging
-server. Acess to it should be restricted.
+server. Access to it should be restricted.
 In addition to having all of the logs in a single place, if configured
 correctly, it can make it harder for intruders to tamper with your logs.