Date: Mon, 1 Apr 2002 16:02:11 +0200 (CEST) From: Martin Karlsson <martin.karlsson@visit.se> To: FreeBSD-gnats-submit@FreeBSD.org Subject: docs/36614: [PATCH] typos in the handbook Message-ID: <200204011402.g31E2B001316@foo31-146.visit.se>
next in thread | raw e-mail | index | archive | help
>Number: 36614 >Category: docs >Synopsis: [PATCH] typos in the handbook >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-doc >State: open >Quarter: >Keywords: >Date-Required: >Class: doc-bug >Submitter-Id: current-users >Arrival-Date: Mon Apr 01 06:10:04 PST 2002 >Closed-Date: >Last-Modified: >Originator: Martin Karlsson >Release: FreeBSD 4.5-RELEASE-p2 i386 >Organization: >Environment: System: FreeBSD foo31-146.visit.se 4.5-RELEASE-p2 FreeBSD 4.5-RELEASE-p2 #0: Wed Mar 27 07:31:58 CET 2002 root@foo31-146.visit.se:/usr/obj/usr/src/sys/BERTIL i386 >Description: This patch fixes some typos in the handbook. Hopefully. Cheers, -- Martin >How-To-Repeat: Read the handbook. >Fix: Apply the following patch. --- diff.handbook begins here --- diff -ru handbook.orig/backups/chapter.sgml handbook/backups/chapter.sgml --- handbook.orig/backups/chapter.sgml Mon Apr 1 15:02:09 2002 +++ handbook/backups/chapter.sgml Mon Apr 1 15:31:13 2002 @@ -511,7 +511,7 @@ printouts and the backup tapes. You will be so distraught when restoring that the notes may prevent you from destroying your backup tapes (How? In place of <command>tar xvf /dev/rsa0</command>, you - might accidently type <command>tar cvf /dev/rsa0</command> and + might accidentally type <command>tar cvf /dev/rsa0</command> and over-write your backup tape).</para> <para>For an added measure of security, make bootable floppies and two diff -ru handbook.orig/config/chapter.sgml handbook/config/chapter.sgml --- handbook.orig/config/chapter.sgml Mon Apr 1 15:02:10 2002 +++ handbook/config/chapter.sgml Mon Apr 1 15:43:21 2002 @@ -975,7 +975,7 @@ during heavy operations, so these operations are quicker than synchronous updates. Additionally the complexity of the implementation is fairly - limited, so the risk of bugs being present is low. A disadvatage + limited, so the risk of bugs being present is low. A disadvantage is that all meta-data are written twice (once into the logging region and once to the proper location) so for normal work, a performance <quote>pessimization</quote> @@ -1085,7 +1085,7 @@ this number, the kernel is given most of its pre-defined limits. Even though a production machine may not actually have 256 users connected as once, the resources needed may be similar to a - high-scale webserver.</para> + high-scale web server.</para> <note><para>As of FreeBSD 4.5, setting <option>MAXUSERS</option> to <literal>0</literal> in your kernel configuration file will choose @@ -1107,7 +1107,7 @@ needed. If you have a web server which maxes out at 1000 simultaneous connections, and each connection eats a 16K receive and 16K send buffer, you need approximately 32MB worth of - network buffers to cover the webserver. A good rule of thumb is + network buffers to cover the web server. A good rule of thumb is to multiply by 2, so 32MBx2 = 64MB/2K = 32768.</para> </sect2> </sect1> diff -ru handbook.orig/cutting-edge/chapter.sgml handbook/cutting-edge/chapter.sgml --- handbook.orig/cutting-edge/chapter.sgml Mon Apr 1 15:02:10 2002 +++ handbook/cutting-edge/chapter.sgml Mon Apr 1 15:31:32 2002 @@ -1389,7 +1389,7 @@ Congratulations.</para> <para>If things went slightly wrong, it is easy to rebuild a particular - piece of the system. For example, if you accidently deleted + piece of the system. For example, if you accidentally deleted <filename>/etc/magic</filename> as part of the upgrade or merge of <filename>/etc</filename>, the &man.file.1; command will stop working. In this case, the fix would be to run:</para> diff -ru handbook.orig/disks/chapter.sgml handbook/disks/chapter.sgml --- handbook.orig/disks/chapter.sgml Mon Apr 1 15:02:10 2002 +++ handbook/disks/chapter.sgml Mon Apr 1 15:31:47 2002 @@ -1753,7 +1753,7 @@ printouts and the backup tapes. You will be so distraught when restoring that the notes may prevent you from destroying your backup tapes (How? In place of <command>tar xvf /dev/rsa0</command>, you - might accidently type <command>tar cvf /dev/rsa0</command> and + might accidentally type <command>tar cvf /dev/rsa0</command> and over-write your backup tape).</para> <para>For an added measure of security, make bootable floppies and two diff -ru handbook.orig/install/chapter.sgml handbook/install/chapter.sgml --- handbook.orig/install/chapter.sgml Mon Apr 1 15:02:11 2002 +++ handbook/install/chapter.sgml Mon Apr 1 15:05:57 2002 @@ -2805,7 +2805,7 @@ <para>For detailed information on Local Area Networks and configuring FreeBSD as a gateway/router refer to the tutorial <ulink url="../ppp-primer/index.html"> - PPP- Pendantic PPP Primer</ulink>.</para> + PPP- Pedantic PPP Primer</ulink>.</para> <screen> User Confirmation Requested Would you like to configure Ethernet or SLIP/PPP network devices? diff -ru handbook.orig/ports/chapter.sgml handbook/ports/chapter.sgml --- handbook.orig/ports/chapter.sgml Mon Apr 1 15:02:15 2002 +++ handbook/ports/chapter.sgml Mon Apr 1 15:06:41 2002 @@ -534,7 +534,7 @@ <step> <para>Change <literal>CHANGE_THIS.FreeBSD.org</literal> to a <application>CVSup</application> near you. See <link - linkend="cvsup-mirrors">CVSupp Mirrors</link> (<xref + linkend="cvsup-mirrors">CVSup Mirrors</link> (<xref linkend="cvsup-mirrors">) for a complete listing of mirror sites.</para> </step> diff -ru handbook.orig/security/chapter.sgml handbook/security/chapter.sgml --- handbook.orig/security/chapter.sgml Mon Apr 1 15:02:10 2002 +++ handbook/security/chapter.sgml Mon Apr 1 15:24:26 2002 @@ -1,4 +1,4 @@ -<!-- +!-- The FreeBSD Documentation Project $FreeBSD: doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v 1.105 2002/03/27 01:16:55 keramida Exp $ @@ -303,7 +303,7 @@ machine. What it does mean is that you should not make it possible to use the password outside of the console or possibly even with the &man.su.1; command. For example, make sure that - your pty's are specified as being unsecure in the + your pty's are specified as being insecure in the <filename>/etc/ttys</filename> file so that direct <username>root</username> logins via <command>telnet</command> or <command>rlogin</command> are @@ -354,9 +354,9 @@ <para>An indirect way to secure staff accounts, and ultimately <username>root</username> access is to use an alternative login access method and - do what is known as <quote>starring</quote> out the crypted + do what is known as <quote>starring</quote> out the encrypted password for the staff accounts. Using the &man.vipw.8; - command, one can replace each instance of a crypted password + command, one can replace each instance of a encrypted password with a single <quote><literal>*</literal></quote> character. This command will update the <filename>/etc/master.passwd</filename> file and user/password database to disable password-authenticated @@ -520,7 +520,7 @@ <application>xterm</application> binary. Sgid binaries can be almost as dangerous. If an intruder can break an sgid-kmem binary, the intruder might be able to read <filename>/dev/kmem</filename> - and thus read the crypted password file, potentially compromising + and thus read the encrypted password file, potentially compromising any passworded account. Alternatively an intruder who breaks group <literal>kmem</literal> can monitor keystrokes sent through pty's, including pty's used by users who login through secure @@ -553,7 +553,7 @@ <para>The only sure fire way is to <literal>*</literal> out as many passwords as you can and use ssh or - Kerberos for access to those accounts. Even though the crypted + Kerberos for access to those accounts. Even though the encrypted password file (<filename>/etc/spwd.db</filename>) can only be read by <username>root</username>, it may be possible for an intruder to obtain read access to that file even if the attacker cannot @@ -679,7 +679,7 @@ scripts use. The <application>ssh</application> client on the client box may already be compromised. All in all, using ssh may be necessary when running over - unsecure links, but it is also a lot harder to deal with.</para> + insecure links, but it is also a lot harder to deal with.</para> <para>A good security script will also check for changes to user and staff members access configuration files: @@ -919,12 +919,12 @@ respect except that it forwards encryption keys by default. What this means is that if you have a secure workstation holding keys that give you access to the rest of the system, and you - ssh to an unsecure machine, your keys + ssh to an insecure machine, your keys becomes exposed. The actual keys themselves are not exposed, but ssh installs a forwarding port for the duration of your login, and if an attacker has broken <username>root</username> on the - unsecure machine he can utilize that port to use your keys to gain + insecure machine he can utilize that port to use your keys to gain access to any other machine that your keys unlock.</para> <para>We recommend that you use ssh in diff -ru handbook.orig/serialcomms/chapter.sgml handbook/serialcomms/chapter.sgml --- handbook.orig/serialcomms/chapter.sgml Mon Apr 1 15:02:10 2002 +++ handbook/serialcomms/chapter.sgml Mon Apr 1 15:34:50 2002 @@ -1678,7 +1678,7 @@ tip57600|Dial any phone number at 57600 bps:\ :dv=/dev/cuaa0:br#57600:at=hayes:pa=none:du:</programlisting> - <para>Then you can things like:</para> + <para>Then you can do things like:</para> <screen>&prompt.root; <userinput>tip -115200 5551234</userinput></screen> @@ -1776,7 +1776,7 @@ followed by a newline. <replaceable>single-char</replaceable> is any single character. If you leave out <replaceable>single-char</replaceable>, then the force character is - the nul character, which you can get by typing + the null character, which you can get by typing <keycombo action="simul"> <keycap>Ctrl</keycap><keycap>2</keycap> </keycombo> --- diff.handbook ends here --- >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-doc" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200204011402.g31E2B001316>