Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit245316e

Browse files
committed
Improve server spoofing wording, per request from Magnus.
1 parent096a30b commit245316e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

‎doc/src/sgml/runtime.sgml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.426 2009/04/2409:43:09 mha Exp $ -->
1+
<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.427 2009/04/2420:46:16 momjian Exp $ -->
22

33
<chapter Id="runtime">
44
<title>Server Setup and Operation</title>
@@ -1392,7 +1392,7 @@ $ <userinput>kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`</userinput
13921392

13931393
<para>
13941394
While the server is running, it is not possible for a malicious user
1395-
tointerfere with client/server communications. However, when the
1395+
totake the place of the normal database server. However, when the
13961396
server is down it is possible for a local user to spoof the normal
13971397
server by starting their own server. The spoof server could read
13981398
passwords and queries sent by clients, but could not return any data

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp