From 882a3a914ea8fb48f15e29f24fc0ed6a56fa84f6 Mon Sep 17 00:00:00 2001 From: Ian Gudger Date: Tue, 2 Apr 2019 10:10:39 -0700 Subject: Capitalize "the" after colon in title https://blog.apastyle.org/apastyle/2011/06/capitalization-after-colons.html --- content/docs/architecture_guide/security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'content/docs') diff --git a/content/docs/architecture_guide/security.md b/content/docs/architecture_guide/security.md index 935301fc7..2dec0765c 100644 --- a/content/docs/architecture_guide/security.md +++ b/content/docs/architecture_guide/security.md @@ -7,7 +7,7 @@ exploitation of kernel bugs when running untrusted code. In order to understand how gVisor achieves this goal, it is first necessary to understand the basic threat model. -## Threats: the Anatomy of an Exploit +## Threats: The Anatomy of an Exploit An exploit takes advantage of a software or hardware bug in order to escalate privileges, gain access to privileged data, or disrupt services. All of the -- cgit v1.2.3