浏览代码

Fixed Security docs typo

Juan Rossi 9 年之前
父节点
当前提交
73a5918417
共有 1 个文件被更改,包括 1 次插入1 次删除
  1. 1 1
      docs/userguide/security.rst

+ 1 - 1
docs/userguide/security.rst

@@ -200,7 +200,7 @@ Logs are usually the first place to look for evidence
 of security breaches, but they are useless if they can be tampered with.
 
 A good solution is to set up centralized logging with a dedicated logging
-server. Acess to it should be restricted.
+server. Access to it should be restricted.
 In addition to having all of the logs in a single place, if configured
 correctly, it can make it harder for intruders to tamper with your logs.