From 9d687e8b7d19da2639c534026139e3be74a0b96c Mon Sep 17 00:00:00 2001 From: jamke <47451874+jamke@users.noreply.github.com> Date: Fri, 8 Feb 2019 20:50:22 +0700 Subject: [PATCH] Fix typo: "acccess" --- about/faq.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/about/faq.md b/about/faq.md index 75c12aec..c666f9ca 100644 --- a/about/faq.md +++ b/about/faq.md @@ -262,7 +262,7 @@ Now, how does this apply to Qubes OS? The above attack requires access to a PCI device, which means that it can be performed only from NetVM / UsbVM, so someone must first break into one of those VMs. But this isn't that hard, because there is a lot of complex code handling network traffic. Recent bugs include DHCP client, DNS client, etc. -Most attacks on NetVM / UsbVM (but not all!) require being somewhat close to the target system - for example connected to the same WiFi network, or in the case of a UsbVM, having physical acccess to a USB port. +Most attacks on NetVM / UsbVM (but not all!) require being somewhat close to the target system - for example connected to the same WiFi network, or in the case of a UsbVM, having physical access to a USB port. ### Can I use AMD-v instead of VT-x?