浏览代码

Fixed Security docs typo

Juan Rossi 10 年之前
父节点
当前提交
73a5918417
共有 1 个文件被更改,包括 1 次插入1 次删除
  1. 1 1
      docs/userguide/security.rst

+ 1 - 1
docs/userguide/security.rst

@@ -200,7 +200,7 @@ Logs are usually the first place to look for evidence
 of security breaches, but they are useless if they can be tampered with.
 of security breaches, but they are useless if they can be tampered with.
 
 
 A good solution is to set up centralized logging with a dedicated logging
 A good solution is to set up centralized logging with a dedicated logging
-server. Acess to it should be restricted.
+server. Access to it should be restricted.
 In addition to having all of the logs in a single place, if configured
 In addition to having all of the logs in a single place, if configured
 correctly, it can make it harder for intruders to tamper with your logs.
 correctly, it can make it harder for intruders to tamper with your logs.