Author: arma
Date: 2011-12-01 04:51:48 +0000 (Thu, 01 Dec 2011)
New Revision: 25239
Modified:
website/trunk/about/en/torusers.wml
Log:
fix typo reported on tor-assistants
Modified: website/trunk/about/en/torusers.wml
===================================================================
--- website/trunk/about/en/torusers.wml 2011-11-30 18:16:28 UTC (rev 25238)
+++ website/trunk/about/en/torusers.wml 2011-12-01 04:51:48 UTC (rev 25239)
@@ -297,7 +297,7 @@
<li>To bypass their own security systems for sensitive professional
activities: For instance, a company may have a strict policy regarding the
material employees can view on the internet. A log review reveals a possible
violation. Tor can be used to verify the information without an exception being
put into corporate security systems.</li>
<li>To connect back to deployed services: A network engineer can use Tor
to remotely connect back to services, without the need for an external machine
and user account, as part of operational testing.</li>
<li>To access internet resources: Acceptable use policy for IT Staff and
normal employees is usually different. Tor can allow unfettered access to the
internet while leaving standard security policies in place.</li>
- <li>To work around ISP network outages: Sometimes when an ISP is having
routing or DNS problems, Tor can make internet resources available, when the
actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
+ <li>To work around ISP network outages: Sometimes when an ISP is having
routing or DNS problems, Tor can make internet resources available, when the
actual ISP is malfunctioning. This can be invaluable in crisis situations. </li>
</ul>
<p>
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits