diff options
author | Ian Gudger <igudger@google.com> | 2019-04-02 10:10:39 -0700 |
---|---|---|
committer | Adin Scannell <adin@scannell.ca> | 2019-04-02 11:36:47 -0700 |
commit | 882a3a914ea8fb48f15e29f24fc0ed6a56fa84f6 (patch) | |
tree | f3102340f1d2dfebe23d14199a8a2c2aee6342d6 /content | |
parent | b11221fe7ce7a3620c8145de2d4219ab2b8625b7 (diff) |
Capitalize "the" after colon in title
https://blog.apastyle.org/apastyle/2011/06/capitalization-after-colons.html
Diffstat (limited to 'content')
-rw-r--r-- | content/docs/architecture_guide/security.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/content/docs/architecture_guide/security.md b/content/docs/architecture_guide/security.md index 935301fc7..2dec0765c 100644 --- a/content/docs/architecture_guide/security.md +++ b/content/docs/architecture_guide/security.md @@ -7,7 +7,7 @@ exploitation of kernel bugs when running untrusted code. In order to understand how gVisor achieves this goal, it is first necessary to understand the basic threat model. -## Threats: the Anatomy of an Exploit +## Threats: The Anatomy of an Exploit An exploit takes advantage of a software or hardware bug in order to escalate privileges, gain access to privileged data, or disrupt services. All of the |