Date: Sat, 20 Feb 2016 04:38:05 +0000 (UTC) From: Warren Block <wblock@FreeBSD.org> To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r48220 - head/en_US.ISO8859-1/books/handbook/jails Message-ID: <201602200438.u1K4c5Rr069473@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: wblock Date: Sat Feb 20 04:38:05 2016 New Revision: 48220 URL: https://svnweb.freebsd.org/changeset/doc/48220 Log: Fixes for grammar and punctuation. PR: 207344 Submitted by: harrij15@rpi.edu Modified: head/en_US.ISO8859-1/books/handbook/jails/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/jails/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/jails/chapter.xml Sat Feb 20 04:17:02 2016 (r48219) +++ head/en_US.ISO8859-1/books/handbook/jails/chapter.xml Sat Feb 20 04:38:05 2016 (r48220) @@ -31,7 +31,7 @@ performance, reliability, and security.</para> <para>Jails build upon the &man.chroot.2; concept, which is used - to change the root directory of a set of processes, creating a + to change the root directory of a set of processes. This creates a safe environment, separate from the rest of the system. Processes created in the chrooted environment can not access files or resources outside of it. For that reason, compromising @@ -39,7 +39,7 @@ attacker to compromise the entire system. However, a chroot has several limitations. It is suited to easy tasks which do not require much flexibility or complex, advanced features. Over - time many ways have been found to escape from a chrooted + time, many ways have been found to escape from a chrooted environment, making it a less than ideal solution for securing services.</para>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201602200438.u1K4c5Rr069473>