浏览代码

Merge pull request #2877 from juanrossi/master

Fixed Security docs typo
Ask Solem Hoel 9 年之前
父节点
当前提交
6304780dab
共有 1 个文件被更改,包括 1 次插入1 次删除
  1. 1 1
      docs/userguide/security.rst

+ 1 - 1
docs/userguide/security.rst

@@ -200,7 +200,7 @@ Logs are usually the first place to look for evidence
 of security breaches, but they are useless if they can be tampered with.
 of security breaches, but they are useless if they can be tampered with.
 
 
 A good solution is to set up centralized logging with a dedicated logging
 A good solution is to set up centralized logging with a dedicated logging
-server. Acess to it should be restricted.
+server. Access to it should be restricted.
 In addition to having all of the logs in a single place, if configured
 In addition to having all of the logs in a single place, if configured
 correctly, it can make it harder for intruders to tamper with your logs.
 correctly, it can make it harder for intruders to tamper with your logs.