summaryrefslogtreecommitdiffstats
path: root/crypto/kerberosIV/doc/whatis.texi
diff options
context:
space:
mode:
Diffstat (limited to 'crypto/kerberosIV/doc/whatis.texi')
-rw-r--r--crypto/kerberosIV/doc/whatis.texi2
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/kerberosIV/doc/whatis.texi b/crypto/kerberosIV/doc/whatis.texi
index 16989bb..6721c23 100644
--- a/crypto/kerberosIV/doc/whatis.texi
+++ b/crypto/kerberosIV/doc/whatis.texi
@@ -96,7 +96,7 @@ attack.
@subheading Impersonating B
-@var{C} can hijack @var{B}'s network address, and when @var{A} sends
+@var{C} can masquerade @var{B}'s network address, and when @var{A} sends
her credentials, @var{C} just pretend to verify them. @var{C} can't
be sure that she is talking to @var{A}.
OpenPOWER on IntegriCloud