aboutsummaryrefslogtreecommitdiffstats
path: root/admin/www/security.html
diff options
context:
space:
mode:
Diffstat (limited to 'admin/www/security.html')
-rw-r--r--admin/www/security.html4
1 files changed, 2 insertions, 2 deletions
diff --git a/admin/www/security.html b/admin/www/security.html
index 0e327626..e1db9082 100644
--- a/admin/www/security.html
+++ b/admin/www/security.html
@@ -2,7 +2,7 @@
"http://www.w3.org/TR/html4/loose.dtd" >
<html>
<!-- THIS PAGE IS AUTOMATICALLY GENERATED. DO NOT EDIT. -->
-<!-- Thu Feb 17 12:47:17 2005 -->
+<!-- Thu Feb 24 10:23:20 2005 -->
<!-- USING HT2HTML 2.0 -->
<!-- SEE http://ht2html.sf.net -->
<!-- User-specified headers:
@@ -187,7 +187,7 @@ if not most Apache 1.3 sites are vulnerable. In any event, the safest
approach is to assume the worst and it is recommended that you apply
<a href="CAN-2005-0202.txt">this Mailman patch</a> as soon as possible.
-<p>For additional piece of mind, it is
+<p>For additional peace of mind, it is
recommended that you regenerate your list member passwords using
<a href="reset_pw.py">the Mailman 2.1.6 reset_pw.py script</a>. Put this file
in your Mailman installation's bin directory. After running the script, you