diff options
author | jocuri%softhome.net <> | 2006-03-01 20:30:14 +0100 |
---|---|---|
committer | jocuri%softhome.net <> | 2006-03-01 20:30:14 +0100 |
commit | b48bb30b5531dc67d199b5f773fa54a77016dc38 (patch) | |
tree | 0cfb92132bc28f3aa3718e562e6e1cec829ce200 /docs | |
parent | 1a18ed133c015a3f85b1b4b3413333d3f85f342c (diff) | |
download | bugzilla-b48bb30b5531dc67d199b5f773fa54a77016dc38.tar.gz bugzilla-b48bb30b5531dc67d199b5f773fa54a77016dc38.tar.xz |
Documentation patch: fix 'vunerabilites'->'vulnerabilities' spelling.
Diffstat (limited to 'docs')
-rw-r--r-- | docs/xml/security.xml | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/xml/security.xml b/docs/xml/security.xml index 0d52df683..49795ce05 100644 --- a/docs/xml/security.xml +++ b/docs/xml/security.xml @@ -1,5 +1,5 @@ <!-- <!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.1.2//EN"> --> -<!-- $Id: security.xml,v 1.11 2006/02/24 01:29:38 jocuri%softhome.net Exp $ --> +<!-- $Id: security.xml,v 1.12 2006/03/01 11:30:14 jocuri%softhome.net Exp $ --> <chapter id="security"> <title>Bugzilla Security</title> @@ -141,7 +141,7 @@ have no other reason to access MySQL remotely, then you should disable the network access. This, along with the suggestion in <xref linkend="security-os-ports"/>, will help protect your system from - any remote vulnerabilites in MySQL. + any remote vulnerabilities in MySQL. </para> <example id="security-mysql-network-ex"> |