Improve server spoofing wording, per request from Magnus.
authorBruce Momjian <bruce@momjian.us>
Fri, 24 Apr 2009 20:46:16 +0000 (20:46 +0000)
committerBruce Momjian <bruce@momjian.us>
Fri, 24 Apr 2009 20:46:16 +0000 (20:46 +0000)
doc/src/sgml/runtime.sgml

index 366b7b05f1cf12a26eb0e9fa5af4fc47e78464d6..998422b1a054f498a3ffb0518f4e53c7dcf02b17 100644 (file)
@@ -1392,7 +1392,7 @@ $ <userinput>kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`</userinput
 
   <para>
    While the server is running, it is not possible for a malicious user
-   to interfere with client/server communications.  However, when the
+   to take the place of the normal database server.  However, when the
    server is down it is possible for a local user to spoof the normal
    server by starting their own server.  The spoof server could read
    passwords and queries sent by clients, but could not return any data