From c47ce1032db4f8db88ce3122d521ef45b6210957 Mon Sep 17 00:00:00 2001 From: Tom Rhodes Date: Tue, 2 Jul 2002 01:48:29 +0000 Subject: [PATCH] Remove sentence, replace with a more understandable one. PR: Chris Pepper --- en_US.ISO8859-1/books/handbook/security/chapter.sgml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/en_US.ISO8859-1/books/handbook/security/chapter.sgml b/en_US.ISO8859-1/books/handbook/security/chapter.sgml index c9e06e4ccd..927d667d85 100644 --- a/en_US.ISO8859-1/books/handbook/security/chapter.sgml +++ b/en_US.ISO8859-1/books/handbook/security/chapter.sgml @@ -920,7 +920,7 @@ this means is that if you have a secure workstation holding keys that give you access to the rest of the system, and you ssh to an insecure machine, your keys - becomes exposed. The actual keys themselves are not exposed, but + are usable. The actual keys themselves are not exposed, but ssh installs a forwarding port for the duration of your login, and if an attacker has broken root on the