summaryrefslogtreecommitdiffhomepage
path: root/content
diff options
context:
space:
mode:
authorIan Gudger <igudger@google.com>2019-04-02 10:10:39 -0700
committerAdin Scannell <adin@scannell.ca>2019-04-02 11:36:47 -0700
commit882a3a914ea8fb48f15e29f24fc0ed6a56fa84f6 (patch)
treef3102340f1d2dfebe23d14199a8a2c2aee6342d6 /content
parentb11221fe7ce7a3620c8145de2d4219ab2b8625b7 (diff)
Capitalize "the" after colon in title
https://blog.apastyle.org/apastyle/2011/06/capitalization-after-colons.html
Diffstat (limited to 'content')
-rw-r--r--content/docs/architecture_guide/security.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/content/docs/architecture_guide/security.md b/content/docs/architecture_guide/security.md
index 935301fc7..2dec0765c 100644
--- a/content/docs/architecture_guide/security.md
+++ b/content/docs/architecture_guide/security.md
@@ -7,7 +7,7 @@ exploitation of kernel bugs when running untrusted code. In order to understand
how gVisor achieves this goal, it is first necessary to understand the basic
threat model.
-## Threats: the Anatomy of an Exploit
+## Threats: The Anatomy of an Exploit
An exploit takes advantage of a software or hardware bug in order to escalate
privileges, gain access to privileged data, or disrupt services. All of the