|
1 |
| -<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.426 2009/04/2409:43:09 mha Exp $ --> |
| 1 | +<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.427 2009/04/2420:46:16 momjian Exp $ --> |
2 | 2 |
|
3 | 3 | <chapter Id="runtime">
|
4 | 4 | <title>Server Setup and Operation</title>
|
@@ -1392,7 +1392,7 @@ $ <userinput>kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`</userinput
|
1392 | 1392 |
|
1393 | 1393 | <para>
|
1394 | 1394 | While the server is running, it is not possible for a malicious user
|
1395 |
| - tointerfere with client/server communications. However, when the |
| 1395 | + totake the place of the normal database server. However, when the |
1396 | 1396 | server is down it is possible for a local user to spoof the normal
|
1397 | 1397 | server by starting their own server. The spoof server could read
|
1398 | 1398 | passwords and queries sent by clients, but could not return any data
|
|