|
1 | | -<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.426 2009/04/2409:43:09 mha Exp $ --> |
| 1 | +<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.427 2009/04/2420:46:16 momjian Exp $ --> |
2 | 2 |
|
3 | 3 | <chapter Id="runtime"> |
4 | 4 | <title>Server Setup and Operation</title> |
@@ -1392,7 +1392,7 @@ $ <userinput>kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`</userinput |
1392 | 1392 |
|
1393 | 1393 | <para> |
1394 | 1394 | While the server is running, it is not possible for a malicious user |
1395 | | - tointerfere with client/server communications. However, when the |
| 1395 | + totake the place of the normal database server. However, when the |
1396 | 1396 | server is down it is possible for a local user to spoof the normal |
1397 | 1397 | server by starting their own server. The spoof server could read |
1398 | 1398 | passwords and queries sent by clients, but could not return any data |
|