Changeset 1ea79a1


Ignore:
Timestamp:
05/30/2004 05:30:47 AM (20 years ago)
Author:
Bruce Dubbs <bdubbs@…>
Branches:
10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.0, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, v5_1, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
Children:
1dad4a4
Parents:
4ea49a31
Message:

Typos and punctuation

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@2236 af4574ff-66df-0310-9fd7-8a98e5e911e0

Files:
33 edited

Legend:

Unmodified
Added
Removed
  • general/genlib/expat/expat.ent

    r4ea49a31 r1ea79a1  
    55<!ENTITY expat-version "1.95.7">
    66<!ENTITY expat-download-http "http://umn.dl.sourceforge.net/sourceforge/expat/expat-&expat-version;.tar.gz">
     7<!-- <!ENTITY expat-download-ftp "ftp://ftp.at.linuxfromscratch.org/opsys/linux/sf/e/expat/expat-&expat-version;.tar.gz"> -->
    78<!ENTITY expat-download-ftp " ">
    89<!ENTITY expat-size "290 KB">
  • general/genlib/fam/fam-desc.xml

    r4ea49a31 r1ea79a1  
    22<title>Contents</title>
    33
    4 <para>The <application><acronym>FAM</acronym></application> package contains 
    5 <command>famd</command> executable and
    6 <filename>libfam</filename> libraries.</para>
     4<para>The <application><acronym>FAM</acronym></application> package contains
     5the <command>famd</command> executable and <filename>libfam</filename>
     6libraries.</para>
    77
    88</sect2>
  • general/genlib/genlib.xml

    r4ea49a31 r1ea79a1  
    1111the <application>C</application> library functions which programs use.</para>
    1212
    13 <para>There are two types of library, static and shared.  Shared libraries
     13<para>There are two types of libraries: static and shared.  Shared libraries
    1414(usually <filename>libXXX.so</filename>) are loaded into memory from the shared
    1515copy at runtime (hence the name).  Static libraries (<filename>libXXX.a
     
    1919
    2020<para>Generally, you only need to install libraries when you are
    21 installing software which requires functionality which they supply.  In
    22 the <acronym>BLFS</acronym> book, each package is listed with a list of (known)
     21installing software that needs the functionality they supply.  In
     22the <acronym>BLFS</acronym> book, each package is presented with a list of (known)
    2323dependencies.  Thus, you can figure out which libraries you need to have
    2424before installing that program.  If you are installing something without
    25 using <acronym>BLFS</acronym> instructions, usually the <filename>README
    26 </filename>  or <filename>INSTALL</filename> file will contain details of the
    27 programs requirements.</para>
     25using <acronym>BLFS</acronym> instructions, usually the <filename>README</filename>
     26or <filename>INSTALL</filename> file will contain details of the
     27program's requirements.</para>
    2828
    2929<para>There are certain libraries which nearly <emphasis>everyone</emphasis>
  • general/genlib/gmp/gmp-intro.xml

    r4ea49a31 r1ea79a1  
    33
    44<para>The <application><acronym>GMP</acronym></application> package
    5 contains an math library. This has useful functions for arbitrary precision
     5contains a math library. This has useful functions for arbitrary precision
    66arithmetic.</para>
    77
  • general/genlib/pcre/pcre-inst.xml

    r4ea49a31 r1ea79a1  
    1010<para>If you reinstall <application>grep</application> after installing <application>pcre</application>,
    1111<application>grep</application> will get linked against <application>pcre</application> and
    12 may cause problems if <filename>/usr</filename> is a seperate mount point. To avoid this,
     12may cause problems if <filename>/usr</filename> is a separate mount point. To avoid this,
    1313either pass the option <emphasis>--disable-perl-regexp</emphasis> when executing <command>./configure</command>
    1414for <application>grep</application> or move <filename>libpcre</filename> to <filename>/lib</filename>
  • general/genlib/readline/readline-exp.xml

    r4ea49a31 r1ea79a1  
    22<title>Command explanations</title>
    33
    4 <para><command>make SHLIB_LIBS=-lcurses</command>: These command makes
    5 the proper symbols available for applications that assume
    6 <application>readline</application> is compiled linked to
    7 <application>ncurses</application>.</para>
     4<para><command>make SHLIB_LIBS=-lcurses</command>: This command makes the
     5proper symbols available for applications that assume
     6<application>readline</application> is compiled with
     7<application>ncurses</application> links.</para>
    88
    99</sect2>
  • general/prog/jdk/j2sdk-inst.xml

    r4ea49a31 r1ea79a1  
    55either or both.</para>
    66
    7 <para>Installation of the precompiled <acronym>JDK</acronym> is easy, change
    8 the executable bit for the downloaded file, change to the directory where you
    9 want it installed and execute the downloaded file. The following (slightly
    10 cryptic version) allows automatic installation.</para>
     7<para>Installation of the precompiled <acronym>JDK</acronym> is easy:
     8create a directory to install from, copy the .bin there, and run the
     9following commands:</para>
    1110
    1211<screen><userinput><command>VERSION=&j2sdk-bin-version; &amp;&amp;
     
    2221mv * /opt/j2sdk/j2sdk-precompiled-${MV}</command></userinput></screen>
    2322
    24 <para>The binary version is now installed.</para>
     23<para>The binary version is now installed.  </para>
    2524
    2625<para>If you don't want to compile the source or are not in a postition to download the source
  • gnome/add/gnome-games/gnome-games-inst.xml

    r4ea49a31 r1ea79a1  
    33
    44<para><application><acronym>GNOME</acronym> Games</application> needs to
    5 be setgid to track high scores. Create a seperate user and group for games.
     5be setgid to track high scores. Create a separate user and group for games.
    66See the <filename>README</filename> file in the source directory for more
    77information:</para>
  • postlfs/config/bootdisk.xml

    r4ea49a31 r1ea79a1  
    7272compiler for this kernel.  If you do so, don't overlook any loadable
    7373modules (which are not addressed here) you might need - they need to be
    74 compiled with same compiler used to make the kernel.</para>
     74compiled with the same compiler used to make the kernel.</para>
    7575
    7676<para>The rescue image must include support for the file system of your
     
    407407<screen><userinput><command>mv GNUmakefile Makefile &amp;&amp;
    408408make &amp;&amp;
    409 make PREFIX=/mnt/loop1 install &amp;&amp;</command></userinput></screen>
     409make PREFIX=/mnt/loop1 install</command></userinput></screen>
    410410
    411411<para><emphasis>Install part of <application>e2fsprogs</application></emphasis></para>
     
    496496
    497497<screen><userinput><command>strip -p --strip-unneeded --remove-section=.comment \
    498 &nbsp;&nbsp;&nbsp;&nbsp;-o /mnt/loop1/lib/libc.so.6 /lib/libc-2.3.2.so &amp;&amp;
     498&nbsp;&nbsp;&nbsp;&nbsp;-o /mnt/loop1/lib/libc.so.6 /lib/libc-2.3.3.so &amp;&amp;
    499499strip -p --strip-unneeded --remove-section=.comment \
    500 &nbsp;&nbsp;&nbsp;&nbsp;-o /mnt/loop1/lib/ld-linux.so.2 /lib/ld-2.3.2.so &amp;&amp;
     500&nbsp;&nbsp;&nbsp;&nbsp;-o /mnt/loop1/lib/ld-linux.so.2 /lib/ld-2.3.3.so &amp;&amp;
    501501strip -p --strip-unneeded --remove-section=.comment \
    502 &nbsp;&nbsp;&nbsp;&nbsp;-o /mnt/loop1/lib/libdl.so.2 /lib/libdl-2.3.2.so &amp;&amp;
     502&nbsp;&nbsp;&nbsp;&nbsp;-o /mnt/loop1/lib/libdl.so.2 /lib/libdl-2.3.3.so &amp;&amp;
    503503chmod 555 /mnt/loop1/lib/{libc.so.6,ld-linux.so.2,libdl.so.2}</command></userinput></screen> 
    504504
  • postlfs/config/compressdoc.xml

    r4ea49a31 r1ea79a1  
    66bzip2'ed pages, a feature you can use to free some disk space while keeping
    77your documentation available. However, things are not that simple: man
    8 directories tend to contain links - hard and symbolic - which defeat simple
     8directories tend to contain links&mdash;hard and symbolic&mdash;which defeat simple
    99ideas like recursively calling <command>gzip</command> on them. A better way
    1010to go is to use the script below.
     
    460460<command>compressdoc --bz2</command> to compress all your system man
    461461pages. You can also run <command>compressdoc --help</command> to get
    462 a comprehensive help about what the script is able to do.</para>
     462comprehensive help about what the script is able to do.</para>
    463463
    464464<para> Don't forget that a few programs, like the <application>X</application>
    465 Window system, <application>XEmacs</application>, also install their
     465Window system and <application>XEmacs</application> also install their
    466466documentation in non standard places (such as <filename class="directory">
    467 /usr/X11R6/man</filename>, etc...). Don't forget to add those locations in the
     467/usr/X11R6/man</filename>, etc...). Be sure to add these locations to the
    468468file <filename>/etc/man.conf</filename>, as a
    469469<envar>MANPATH</envar>=<replaceable>/path</replaceable> section.</para>
  • postlfs/config/inputrc.xml

    r4ea49a31 r1ea79a1  
    55<para><filename>Inputrc</filename> deals with the mapping of the keyboard for
    66certain situations.  This file is the start-up file used by
    7 <application>readline</application> - the input related library used by
    8 <application>Bash</application> and most other shells.</para>
     7<application>readline</application>&mdash;the input related library used by
     8<application>bash</application> and most other shells.</para>
    99
    1010<para>For more information see <command>info bash</command> -- <emphasis
  • postlfs/config/netfs.xml

    r4ea49a31 r1ea79a1  
    44
    55<para>While <acronym>LFS</acronym> is capable of mounting network file
    6 systems such as <acronym>NFS</acronym> these are not mounted by
    7 <filename>mountfs</filename> init script since the tools needed to mount
    8 these systems may not be available on the root partition and also since
    9 network file systems need to be mounted after the networking is on and
    10 need to be unmounted before the network goes down.</para>
     6systems such as <acronym>NFS</acronym> these are not mounted by the
     7<filename>mountfs</filename> init script.  The tools needed to mount
     8these systems may not be available on the root partition and the
     9network file systems need to be mounted after the networking is activated.
     10These file systems also need to be unmounted before the network goes down.</para>
    1111
    1212<para>Install the <filename>/etc/rc.d/init.d/netfs</filename>
  • postlfs/config/skel.xml

    r4ea49a31 r1ea79a1  
    5353<para><emphasis>/etc/skel</emphasis></para>
    5454
    55 <para>To get started create an <filename class="directory">/etc/skel</filename> directory
     55<para>To get started, create an <filename class="directory">/etc/skel</filename> directory
    5656and make sure it is writable only by the system administrator, usually
    5757root. Creating the directory as root is the best way to go.</para>
     
    9595<para><emphasis>When Adding a User</emphasis></para>
    9696
    97 <para>When adding a new user with <command>useradd</command> use
     97<para>When adding a new user with <command>useradd</command>, use
    9898the <option>-m</option> parameter, which tells
    9999<command>useradd</command> to create the user's home directory and
  • postlfs/config/vimrc.xml

    r4ea49a31 r1ea79a1  
    33<title>/etc/vimrc, ~/.vimrc</title>
    44
    5 <para>The <acronym>LFS</acronym> book installs
    6 <application>vim</application> as its editor.  At this point we should
    7 state that there are a <emphasis>lot</emphasis> of different editors out
    8 there including <application>emacs</application>,
    9 <application>nano</application>, <application>joe</application> and many
    10 more.  Anyone who has been around the Internet (especially usenet) for a
    11 short time will certainly have observed at least one flame war, usually
    12 involving <application>vim</application> and
     5<para>The <acronym>LFS</acronym> book installs <application>vim</application>
     6as its text editor.  At this point we should state that there are a
     7<emphasis>lot</emphasis> of different editing applications out there including
     8<application>emacs</application>, <application>nano</application>,
     9<application>joe</application> and many more.  Anyone who has been around the
     10Internet (especially usenet) for a short time will certainly have observed at
     11least one flame war, usually involving <application>vim</application> and
    1312<application>emacs</application> users!</para>
    1413
     
    2928the file from <filename>/etc/skel/.vimrc</filename> to
    3029<filename>/etc/vimrc</filename> and the home directory of users already
    31 on the system, like root. Be sure to set permissions, owner and group if
     30on the system, like root. Be sure to set permissions, owner, and group if
    3231you do copy anything directly from <filename>/etc/skel</filename>.</para>
    3332
  • postlfs/editors/emacs/emacs-desc.xml

    r4ea49a31 r1ea79a1  
    2929
    3030<sect3><title>ebrowse</title>
    31 <para><command>ebrowse</command> permits browsing of C++ class
    32 hierarchies from within emacs.</para></sect3>
     31
     32<para><command>ebrowse</command> permits browsing of C++ class hierarchies from
     33within emacs.</para></sect3>
    3334
    3435<sect3><title>emacsclient</title>
  • postlfs/filesystems/reiser/reiser-desc.xml

    r4ea49a31 r1ea79a1  
    1212
    1313<sect3><title>debugreiserfs</title>
    14 <para><command>debugreiserfs</command> can sometimes help to solve problems
    15 with <application>ReiserFS</application> file systems.  If it is called without
    16 options, it prints the super
    17 block of any reiserfs file system found on the device.</para></sect3>
     14
     15<para><command>debugreiserfs</command> can sometimes help to solve problems
     16with <application>ReiserFS</application> file systems.  If it is called without
     17options, it prints the super block of any reiserfs file system found on the
     18device.</para></sect3>
    1819
    1920<sect3><title>mkreiserfs</title>
  • postlfs/security/cracklib/cracklib-intro.xml

    r4ea49a31 r1ea79a1  
    22<title>Introduction to <application>cracklib</application></title>
    33
    4 <para>The cracklib package contains a library used to enforce strong
    5 passwords by comparing user selected passwords to words in a
    6 chosen wordlist.</para>
     4<para>The cracklib package contains a library used to enforce strong passwords
     5by comparing user selected passwords to words in a chosen wordlist.</para>
    76
    87<sect3><title>Package information</title>
     
    2726</itemizedlist>
    2827
    29 <para>You will also need to download a wordlist for use with cracklib. 
    30 There are two wordlists to choose from at the following location.
    31 Use the <filename>cracklib</filename> word list for good security,
    32 or opt for the <filename>allwords</filename> word list for
    33 lightweight machines short on <acronym>RAM</acronym>.  You can of course choose any other
    34 word list that you have at your disposal.</para>
     28<para>You will also need to download a wordlist for use with cracklib.  There
     29are two wordlists to choose from at the following location.  Use the
     30<filename>cracklib</filename> word list for good security, or opt for the
     31<filename>allwords</filename> word list for lightweight machines short on
     32<acronym>RAM</acronym>.  You can of course choose any other word list that you
     33have at your disposal.</para>
    3534
    3635<para>cracklib (&crackdict-size;): <ulink url="http://www.cotse.com/wordlists/cracklib"/></para>
  • postlfs/security/firewalling/busybox.xml

    r4ea49a31 r1ea79a1  
    1111
    1212<para>Be cautious.  Every service you offer and have enabled makes your
    13 setup more complex and your box less secure: You induce the risks of
    14 misconfigured services or running a service with an exploitable bug, both risks
    15 that a firewall principally should be immune of. See the introduction to
     13setup more complex and your box less secure. You induce the risks of
     14misconfigured services or running a service with an exploitable bug.  A firewall
     15should generally not run any extra services. See the introduction to
    1616<xref linkend="postlfs-security-fw-masqRouter"/> for some more details.</para>
    1717
     
    3131iptables -A OUTPUT                                      -j ACCEPT</screen>
    3232
    33 <para>However, it is generally not advisable to leave OUTPUT unrestricted: you lose
    34 any control on trojans who'd like to "call home", and a bit of redundancy in case
     33<para>However, it is generally not advisable to leave OUTPUT unrestricted. You lose
     34any control over trojans who'd like to "call home", and a bit of redundancy in case
    3535you've (mis-)configured a service so that it does broadcast its existence to the
    3636world.</para>
     
    5959
    6060<listitem><para><anchor id='postlfs-security-fw-BB-4' xreflabel="example no. 4"/>If you are
    61 frequently accessing ftp-servers or enjoy chatting you might notice certain
     61frequently accessing ftp-servers or enjoy chatting, you might notice certain
    6262delays because some implementations of these daemons have the feature of
    63 querying an identd on your box for your username for logging.
     63querying an identd on your box for logging usernames.
    6464Although there's really no harm in this, having an identd running is not
    6565recommended because some implementations are known to be vulnerable.</para>
     
    7171iptables -A OUTPUT -p tcp --sport 113 -m state --state RELATED -j ACCEPT</screen></listitem>
    7272
    73 <listitem><para>To log and drop invalid packets, mostly harmless packets
    74 that came in after netfilter's timeout, sometimes scans:</para>
     73<listitem><para>To log and drop invalid packets (harmless packets
     74that came in after netfilter's timeout or some types of network scans):</para>
    7575
    7676<screen>iptables -I INPUT 1 -p tcp -m state --state INVALID -j LOG --log-prefix \
  • postlfs/security/firewalling/disclaimer.xml

    r4ea49a31 r1ea79a1  
    66DOCUMENT.</emphasis></para> -->
    77
    8 <para>This document is meant as an introduction to how to setup a
    9 firewall - it is not a complete guide to securing systems.  Firewalling
    10 is a complex issue that requires careful configuration.
    11 The scripts quoted here are simply intended to give examples as to how
    12 a firewall works, they are not intended to fit into any imaginable
    13 configuration and may not prevent any imaginable attack.</para>
     8<para>This document is meant as an introduction to how to setup a firewall.  It
     9is not a complete guide to securing systems.  Firewalling is a complex issue
     10that requires careful configuration.  The scripts quoted here are simply
     11intended to give examples as to how a firewall works, they are not intended to
     12fit into any imaginable configuration and may not prevent any imaginable
     13attack.</para>
    1414
    1515<para>The purpose of this text is simply to give you a hint on how to get
  • postlfs/security/firewalling/intro.xml

    r4ea49a31 r1ea79a1  
    55against malicious access by using a single machine as a firewall.
    66This does imply that the firewall is to be considered a single point
    7 of failure, but it can make the administrators life a lot easier.</para>
     7of failure, but it can make the administrator's life a lot easier.</para>
    88
    99<para>In a perfect world where you knew that every daemon or service
     
    1111buffer-overflows and any other imaginable problem regarding its
    1212security, and where you trusted every user accessing your services
    13 to aim no harm, you wouldn't need to do have a firewall! 
     13to aim no harm, you wouldn't need to have a firewall! 
    1414In the real world however, daemons may be misconfigured,
    1515exploits against essential services are freely available, you
     
    2121
    2222<para>Don't assume however, that having a firewall makes careful
    23 configuration redundant, nor that it makes any negligent
    24 misconfiguration harmless, nor that it prevents anyone from exploiting a
     23configuration redundant, or that it makes any negligent
     24misconfiguration harmless. It also doesn't prevent anyone from exploiting a
    2525service you intentionally offer but haven't recently updated or patched
    2626after an exploit went public.  Despite having a firewall, you need to
     
    4040companies such as Symantec, of which they claim or pretend that it
    4141secures a home or desktop-pc with Internet access. This topic is
    42 highly relevant for users who do not know the ways their computers
    43 might be accessed via the Internet and how to disable these,
    44 especially if they are always online and if they are connected via
     42highly relevant for users who do not know the methods their computers
     43might be accessed via the Internet or how to disable them,
     44especially if they are always online and connected via
    4545broadband links.</para></sect3>
    4646
     
    5959performing masquerading or routing functions, but offering a bunch of
    6060services, e.g., web-cache, mail, etc.  This may be very commonly used
    61 for home networks, but can definitely not to be considered as secure
     61for home networks, but can definitely not be considered as secure
    6262anymore because the combining of server and router on one machine raises
    6363the complexity of the setup.</para></sect3>
  • postlfs/security/firewalling/kernel.xml

    r4ea49a31 r1ea79a1  
    33
    44<para>If you want your Linux-Box to have a firewall, you must first ensure
    5 that your kernel has been compiled with the relevant options turned on
     5that your kernel has been compiled with the relevant options turned on.
    66<!-- <footnote><para>If you needed assistance how to configure, compile and install
    77a new kernel, refer back to chapter VIII of the LinuxFromScratch book,
     
    1010<ulink url="http://www.linuxfromscratch.org/view/3.1/chapter08/lilo.html">Making the LFS system bootable</ulink>
    1111; note, that you'll need to reboot
    12 to actually run your new kernel.</para></footnote>-->.</para>
     12to actually run your new kernel.</para></footnote>-->
     13</para>
    1314
    1415<para>How to configure your kernel, with enabling the options to be
  • postlfs/security/firewalling/masqrouter.xml

    r4ea49a31 r1ea79a1  
    8282<command>EOF</command></userinput></screen>
    8383
    84 <para>With this script your intranet should be sufficiently
    85 secure against external attacks: no one should be able to setup a
    86 new connection to any internal service and, if it's masqueraded,
    87 it s even invisible; furthermore, your firewall should be nearly immune
    88 because there are no services running that a cracker could attack.</para>
     84<para>With this script your intranet should be sufficiently secure against
     85external attacks. No one should be able to setup a new connection to any
     86internal service and, if it's masqueraded, it's even invisible. Furthermore,
     87your firewall should be nearly immune because there are no services running
     88that a cracker could attack.</para>
    8989
    9090<para>Note: if the interface you're connecting to the Internet
     
    9797
    9898<para>If you need stronger security (e.g., against DOS, connection
    99 highjacking, spoofing, etc.) have a look at the list of
     99highjacking, spoofing, etc.), have a look at the list of
    100100<xref linkend="postlfs-security-fw-library"/> at the end of this section.</para>
    101101
  • postlfs/security/firewalling/persfw.xml

    r4ea49a31 r1ea79a1  
    22<title>Personal Firewall</title>
    33
    4 <para>A Personal Firewall is supposed to let you access the all services
     4<para>A Personal Firewall is supposed to let you access all the services
    55offered on the Internet, but keep your box secure and your data private.</para>
    66
    7 <para>Below is a slightly modified version of Rusty Russell's
    8 recommendation from the <ulink url="http://www.netfilter.org/documentation/HOWTO/packet-filtering-HOWTO.html">Linux
     7<para>Below is a slightly modified version of Rusty Russell's recommendation
     8from the <ulink
     9url="http://www.netfilter.org/documentation/HOWTO/packet-filtering-HOWTO.html">Linux
    9102.4 Packet Filtering HOWTO</ulink>:</para>
    1011
     
    5657<xref linkend="postlfs-security-fw-BB-4"/>.</para>
    5758
    58 <para>Even if you have daemons / services running on your box, these
     59<para>Even if you have daemons or services running on your box, these
    5960should be inaccessible everywhere but from your box itself.
    6061If you want to allow access to services on your machine, such as ssh or pinging,
  • postlfs/security/pam/linux_pam-config.xml

    r4ea49a31 r1ea79a1  
    99<sect3><title>Configuration Information</title>
    1010
    11 <para>Configuration information is placed in <filename>/etc/pam.d</filename> or
    12 <filename>/etc/pam.conf</filename> depending on the application that is using
    13 <application><acronym>PAM</acronym></application>. Below are example files of
    14 each type:</para>
     11<para>Configuration information is placed in <filename>/etc/pam.d</filename> or
     12<filename>/etc/pam.conf</filename> depending on user preference.  Below are
     13example files of each type:</para>
    1514
    1615<screen># Begin /etc/pam.d/other
  • postlfs/security/pam/linux_pam-exp.xml

    r4ea49a31 r1ea79a1  
    1212the mailspool directory <acronym>FHS</acronym> compliant.</para>
    1313
    14 <para><option>--enable-read-both-confs</option>: This switch lets the local administrator choose which configuration file setup to use.</para>
     14<para><option>--enable-read-both-confs</option>: This switch lets the local
     15administrator choose which configuration file setup to use.</para>
    1516
    1617<para><command>mv /lib/libpam.a /lib/libpam_misc.a /lib/libpamc.a
  • postlfs/security/security.xml

    r4ea49a31 r1ea79a1  
    1616<para>Prevention of breaches, like a trojan, are assisted by applications like
    1717<application>GnuPG</application>, specifically the ability to confirm signed
    18 packages, which prevents modification of the <acronym>TAR</acronym> ball after
     18packages, which recognizes modifications of the <acronym>TAR</acronym> ball after
    1919the packager creates it.</para>
    2020
  • postlfs/security/shadow/shadow-config.xml

    r4ea49a31 r1ea79a1  
    77<filename>/etc/pam.d/passwd</filename>,
    88<filename>/etc/pam.d/su</filename>,
    9 <filename>/etc/pam.d/shadow</filename>,
     9<filename>/etc/pam.d/shadow</filename>, and
    1010<filename>/etc/pam.d/useradd</filename></para>
    1111</sect3>
  • postlfs/security/tripwire/tripwire-config.xml

    r4ea49a31 r1ea79a1  
    3838tripwire -m i</command></userinput></screen>
    3939
    40 <para>During configuration <application>Tripwire</application> will create two (2) keys: a site key and
    41  a local key which will be stored in <filename class="directory">/etc/tripwire/
    42 </filename>.</para>
     40<para>During installation <application>Tripwire</application> will create two
     41(2) keys: a site key and a local key which will be stored in <filename
     42class="directory">/etc/tripwire/</filename>.</para>
    4343
    4444</sect3>
     
    5959on your system so that <application>Tripwire</application> will not continually notify you that
    6060files you intentionally changed are a security violation. To do this you
    61 must first <command>ls /var/lib/tripwire/report/</command> and note
     61must first <command>ls -l /var/lib/tripwire/report/</command> and note
    6262the name of the newest file which starts with <filename>linux-</filename> and
    6363ends in <filename>.twr</filename>. This encrypted file was created during the
  • postlfs/shells/ash/ash-intro.xml

    r4ea49a31 r1ea79a1  
    33
    44<para><command>ash</command> is a shell that is the most compliant with the
    5 Bourne Shell (not to be confused with Bourne Again SHell i.e. <application>Bash</application>
     5Bourne Shell (not to be confused with Bourne Again SHell i.e., <application>Bash</application>
    66installed in <acronym>LFS</acronym>) without any additional features.
    77Bourne Shell is available on most commercial
  • postlfs/shells/tcsh/tcsh.ent

    r4ea49a31 r1ea79a1  
    55<!ENTITY tcsh-config SYSTEM "tcsh-config.xml">
    66<!ENTITY tcsh-desc SYSTEM "tcsh-desc.xml">
    7 <!ENTITY tcsh-version "6.12.00">
     7<!ENTITY tcsh-version "6.13.00">
    88<!ENTITY tcsh-download-http "http://gd.tuwien.ac.at/utils/shells/tcsh/tcsh-&tcsh-version;.tar.gz">
    99<!ENTITY tcsh-download-ftp " ">
  • postlfs/shells/zsh/zsh-config.xml

    r4ea49a31 r1ea79a1  
    66<application>ZSH</application> including
    77<filename>/etc/zshenv</filename>, <filename>/etc/zprofile</filename>,
    8 <filename>/etc/zshrc</filename>, <filename>/etc/zlogin</filename> and
     8<filename>/etc/zshrc</filename>, <filename>/etc/zlogin</filename>, and
    99<filename>/etc/zlogout</filename>.  You can find more information on
    1010these in the <filename>zsh(1)</filename> and related
  • server/other/rsync/rsync-config.xml

    r4ea49a31 r1ea79a1  
    99
    1010<para>This is a simple download-only configuration. See the rsyncd man-page for
    11 additional options (i.e. user authentication).</para>
     11additional options (i.e., user authentication).</para>
    1212
    1313<screen><userinput><command>cat &gt; /etc/rsyncd.conf &lt;&lt; "EOF"</command>
  • xsoft/graphweb/mozilla/mozilla-intro.xml

    r4ea49a31 r1ea79a1  
    77
    88<para>The Mozilla project also hosts two subprojects that aim to cater to the needs
    9 of users who don't need the complete browser suite or like to have seperate applications
     9of users who don't need the complete browser suite or like to have separate applications
    1010for browsing and e-mail. These subprojects are
    1111<ulink url="http://www.mozilla.org/products/firefox/">Mozilla Firefox</ulink>,
     
    1313<ulink url="http://www.mozilla.org/projects/thunderbird/">Mozilla Thunderbird</ulink>,
    1414(a stand-alone mail client based on the Mozilla source code). The build instructions
    15 for these two applications are discussed in seperate sections:</para>
     15for these two applications are discussed in separate sections:</para>
    1616
    1717<itemizedlist>
Note: See TracChangeset for help on using the changeset viewer.