Browse Source

Fixed Security docs typo

Juan Rossi 9 years ago
parent
commit
0e4ac4ca80
1 changed files with 1 additions and 1 deletions
  1. 1 1
      docs/userguide/security.rst

+ 1 - 1
docs/userguide/security.rst

@@ -200,7 +200,7 @@ Logs are usually the first place to look for evidence
 of security breaches, but they are useless if they can be tampered with.
 of security breaches, but they are useless if they can be tampered with.
 
 
 A good solution is to set up centralized logging with a dedicated logging
 A good solution is to set up centralized logging with a dedicated logging
-server. Acess to it should be restricted.
+server. Access to it should be restricted.
 In addition to having all of the logs in a single place, if configured
 In addition to having all of the logs in a single place, if configured
 correctly, it can make it harder for intruders to tamper with your logs.
 correctly, it can make it harder for intruders to tamper with your logs.