瀏覽代碼

Fixed Security docs typo

Juan Rossi 10 年之前
父節點
當前提交
0e4ac4ca80
共有 1 個文件被更改,包括 1 次插入1 次删除
  1. 1 1
      docs/userguide/security.rst

+ 1 - 1
docs/userguide/security.rst

@@ -200,7 +200,7 @@ Logs are usually the first place to look for evidence
 of security breaches, but they are useless if they can be tampered with.
 of security breaches, but they are useless if they can be tampered with.
 
 
 A good solution is to set up centralized logging with a dedicated logging
 A good solution is to set up centralized logging with a dedicated logging
-server. Acess to it should be restricted.
+server. Access to it should be restricted.
 In addition to having all of the logs in a single place, if configured
 In addition to having all of the logs in a single place, if configured
 correctly, it can make it harder for intruders to tamper with your logs.
 correctly, it can make it harder for intruders to tamper with your logs.