瀏覽代碼

Merge pull request #2877 from juanrossi/master

Fixed Security docs typo
Ask Solem Hoel 10 年之前
父節點
當前提交
6304780dab
共有 1 個文件被更改,包括 1 次插入1 次删除
  1. 1 1
      docs/userguide/security.rst

+ 1 - 1
docs/userguide/security.rst

@@ -200,7 +200,7 @@ Logs are usually the first place to look for evidence
 of security breaches, but they are useless if they can be tampered with.
 of security breaches, but they are useless if they can be tampered with.
 
 
 A good solution is to set up centralized logging with a dedicated logging
 A good solution is to set up centralized logging with a dedicated logging
-server. Acess to it should be restricted.
+server. Access to it should be restricted.
 In addition to having all of the logs in a single place, if configured
 In addition to having all of the logs in a single place, if configured
 correctly, it can make it harder for intruders to tamper with your logs.
 correctly, it can make it harder for intruders to tamper with your logs.