Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 20 Feb 2016 04:38:05 +0000 (UTC)
From:      Warren Block <wblock@FreeBSD.org>
To:        doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org
Subject:   svn commit: r48220 - head/en_US.ISO8859-1/books/handbook/jails
Message-ID:  <201602200438.u1K4c5Rr069473@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: wblock
Date: Sat Feb 20 04:38:05 2016
New Revision: 48220
URL: https://svnweb.freebsd.org/changeset/doc/48220

Log:
  Fixes for grammar and punctuation.
  
  PR:		207344
  Submitted by:	harrij15@rpi.edu

Modified:
  head/en_US.ISO8859-1/books/handbook/jails/chapter.xml

Modified: head/en_US.ISO8859-1/books/handbook/jails/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/jails/chapter.xml	Sat Feb 20 04:17:02 2016	(r48219)
+++ head/en_US.ISO8859-1/books/handbook/jails/chapter.xml	Sat Feb 20 04:38:05 2016	(r48220)
@@ -31,7 +31,7 @@
       performance, reliability, and security.</para>
 
     <para>Jails build upon the &man.chroot.2; concept, which is used
-      to change the root directory of a set of processes, creating a
+      to change the root directory of a set of processes.  This creates a
       safe environment, separate from the rest of the system.
       Processes created in the chrooted environment can not access
       files or resources outside of it.  For that reason, compromising
@@ -39,7 +39,7 @@
       attacker to compromise the entire system.  However, a chroot has
       several limitations.  It is suited to easy tasks which do not
       require much flexibility or complex, advanced features.  Over
-      time many ways have been found to escape from a chrooted
+      time, many ways have been found to escape from a chrooted
       environment, making it a less than ideal solution for securing
       services.</para>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201602200438.u1K4c5Rr069473>