From 9fdf3a4301440534a8587d65a1aeac5d3231f869 Mon Sep 17 00:00:00 2001 From: bwarsaw <> Date: Thu, 24 Feb 2005 15:24:31 +0000 Subject: typo --- admin/www/security.ht | 2 +- admin/www/security.html | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) (limited to 'admin/www') diff --git a/admin/www/security.ht b/admin/www/security.ht index f5bd9e38..249b7745 100644 --- a/admin/www/security.ht +++ b/admin/www/security.ht @@ -27,7 +27,7 @@ if not most Apache 1.3 sites are vulnerable. In any event, the safest approach is to assume the worst and it is recommended that you apply this Mailman patch as soon as possible. -
For additional piece of mind, it is +
For additional peace of mind, it is recommended that you regenerate your list member passwords using the Mailman 2.1.6 reset_pw.py script. Put this file in your Mailman installation's bin directory. After running the script, you diff --git a/admin/www/security.html b/admin/www/security.html index 0e327626..e1db9082 100644 --- a/admin/www/security.html +++ b/admin/www/security.html @@ -2,7 +2,7 @@ "http://www.w3.org/TR/html4/loose.dtd" > - +