Package: debian-handbook Version: 6.0+20120509 Severity: minor Tags: patch Here are a whole bunch of spelling fixes I caught with aspell. This patch is against the Git repository at commit 92c652df.
-- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 3.2.0-2-686-pae (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- no debconf information
--- a/en-US/00b_foreword.xml +++ b/en-US/00b_foreword.xml @@ -90,7 +90,7 @@ <para>Users of another Linux distribution, or of another Unix variant, will discover the specifics of Debian, and should become operational - very quickly while benefitting fully from the unique advantages of this + very quickly while benefiting fully from the unique advantages of this distribution.</para> <para>Finally, readers who already have some knowledge of Debian and --- a/en-US/01_the-debian-project.xml +++ b/en-US/01_the-debian-project.xml @@ -623,7 +623,7 @@ has remained strongly attached to Debian, since he continues to promote this distribution in political and economic spheres. He still sporadically appears on the e-mail lists to give his advice - and present his latests initiatives in favor of Debian.</para> + and present his latest initiatives in favor of Debian.</para> <indexterm><primary>codename</primary></indexterm> <indexterm><primary>name</primary><secondary>codename</secondary></indexterm> <indexterm><primary><emphasis role="distribution">Rex</emphasis></primary></indexterm> --- a/en-US/04_installation.xml +++ b/en-US/04_installation.xml @@ -355,7 +355,7 @@ <para>Once booted, the installation program guides you step by step throughout the process. This section presents each of these steps in detail. Here we follow the process of an installation from a - Multi-Arch DVD-ROM; other types of installlations, + Multi-Arch DVD-ROM; other types of installations, (<emphasis>netinst</emphasis> or <emphasis>businesscard</emphasis>) may be slightly different. We will also address installation in graphical mode, but this differs from “classic” installation only @@ -1265,7 +1265,7 @@ actually be made of the machine. As such, you might want to use a package management tool to refine the selection of installed packages. The two most frequently used tools (which are installed if - the “Graphical desktop enviroment” profile was chosen) are + the “Graphical desktop environment” profile was chosen) are <command>apt</command> (accessible from the command line) and <command>synaptic</command> (<menuchoice><guimenu>System</guimenu> <guisubmenu>Administration</guisubmenu> <guimenuitem>Synaptic Package --- a/en-US/05_packaging-system.xml +++ b/en-US/05_packaging-system.xml @@ -673,7 +673,7 @@ Tag: admin::package-management, hardware::storage, hardware::storage:cd, interfa prior to installation of the package, while the <filename>postinst</filename> follows it. Likewise, <filename>prerm</filename> is invoked before removal of a package and - <filename>postrm</filename> aftwards. An update of a package is + <filename>postrm</filename> afterwards. An update of a package is equivalent to removal of the previous version and installation of the new one. It is not possible to describe in detail all the possible scenarios here, but we will discuss the most common two: an @@ -908,7 +908,7 @@ Tag: admin::package-management, hardware::storage, hardware::storage:cd, interfa program offers options that allow the system to respond automatically according to the same logic: <command>--force-confold</command> retains the old version of the - file; <command>--force-confnew</command> wil use the new version of + file; <command>--force-confnew</command> will use the new version of the file (these choices are respected, even if the file has not been changed by the administrator, which only rarely has the desired effect). Adding the <command>--force-confdef</command> @@ -1635,7 +1635,7 @@ $ </computeroutput><userinput>ls -s phpmyadmin_2.0.5-2_all.deb</userinput> <para>You will find that this process is extremely simple. You must know, however, that the package generated does not have any information on dependencies, since the dependencies in the two packaging formats - don't have systematic correspondance. The administrator, thus, must + don't have systematic correspondence. The administrator, thus, must manually ensure that the converted package will function correctly, and this is why Debian packages thus generated should be avoided as much as possible. Fortunately, Debian has the largest collection of software --- a/en-US/06_apt.xml +++ b/en-US/06_apt.xml @@ -658,7 +658,7 @@ deb-src http://ftp.debian.org/debian stable main contrib non-free <indexterm><primary><command>aptitude safe-upgrade</command></primary></indexterm> <para>For more important upgrades, such as the change from one major - Debian versionto the next, you need to use <command>aptitude + Debian version to the next, you need to use <command>aptitude full-upgrade</command> (the option used to be named <literal>dist-upgrade</literal>, for “distribution upgrade”). With this instruction, <command>aptitude</command> will complete the @@ -930,7 +930,7 @@ Pin-Priority: 500 role="distribution">Unstable</emphasis> without diverging too much from the system's initial state.</para> - <para>Even if you will occasionnaly encounter problems while mixing + <para>Even if you will occasionally encounter problems while mixing packages from different distributions, <command>aptitude</command> manages such coexistence very well and limits risks very effectively. The best way to proceed is to list all distributions used in @@ -1308,7 +1308,7 @@ i A apt-xapian-index Depends python-debian (>= 0.1.15)</computeroutput> package that it did not recommend formerly, the package won't be marked for installation. However, it will be listed on the upgrade screen so that the administrator can still select it for - installaion.</para> + installation.</para> <para>Suggestions between packages are also taken into account, but in a manner adapted to their specific status. For example, since @@ -1370,7 +1370,7 @@ i A apt-xapian-index Depends python-debian (>= 0.1.15)</computeroutput> <para>Beware, this logfile only contains a summary of operations performed by <command>aptitude</command>. If other front-ends (or - even <command>dpkg</command> itself) are occasionaly used, then + even <command>dpkg</command> itself) are occasionally used, then <command>aptitude</command>'s log will only contain a partial view of the operations, so you can't rely on it to build a trustworthy history of the system.</para> --- a/en-US/08_basic-configuration.xml +++ b/en-US/08_basic-configuration.xml @@ -84,7 +84,7 @@ <para>Historically, each locale has an associated “character set” (group of known characters) and a preferred “encoding” - (internal representationfor characters within the computer).</para> + (internal representation for characters within the computer).</para> <para>The <emphasis>ISO-8859-1</emphasis> (or “Latin 1”) encoding, for instance, was used preferentially in France. But for @@ -769,7 +769,7 @@ adsl:2345:respawn:/usr/sbin/pppd call dsl-provider <indexterm><primary>DNS</primary></indexterm> <indexterm><primary>Domain Name Service</primary></indexterm> - <para>DNS (Domain Name Service) is a distributed and hierarchal + <para>DNS (Domain Name Service) is a distributed and hierarchical service mapping names to IP addresses, and vice-versa. Specifically, it can turn a human-friendly name such as <literal>www.eyrolles.com</literal> into the actual IP address, @@ -1481,7 +1481,7 @@ nameserver 8.8.8.8 implementation of <filename>/dev/</filename> by a virtual filesystem called <emphasis>devfs</emphasis>. In some cases, this makes it easier to find files, since the naming convention uses a - hierarchal structure: the first partition of the master hard drive + hierarchical structure: the first partition of the master hard drive on the first IDE bus was then represented by the file, <filename>/dev/ide/host0/bus0/target0/lun0/part1</filename>. Not only were these naming conventions not very intuitive, but they @@ -1639,7 +1639,7 @@ mirexpress:/dev/disk/by-id# </computeroutput> boot=/dev/sda # the partition that contains Debian root=/dev/sda2 -# the item to be loaded by defaul +# the item to be loaded by default default=Linux # the most recent kernel image @@ -1927,7 +1927,7 @@ macosx=/dev/sda5 doesn't need access to hardware variables. However, since it only exists in live memory, it is zeroed out every time the machine is booted, contrary to the CMOS clock, which has a battery and - therefores “survives” rebooting or halting of the machine. The + therefore “survives” rebooting or halting of the machine. The system clock is, thus, set from the CMOS clock during boot, and the CMOS clock is updated on shutdown (to take into account possible changes or corrections if it has been improperly adjusted).</para> --- a/en-US/09_unix-services.xml +++ b/en-US/09_unix-services.xml @@ -64,7 +64,7 @@ <para>In some configurations, the BIOS may be configured not to execute the MBR, but to seek its equivalent on the network, making it - posssible to build computers without a hard drive, or which are + possible to build computers without a hard drive, or which are completely reinstalled on each boot. This option is not available on all hardware and it generally requires an appropriate combination of BIOS and network card.</para> @@ -975,7 +975,7 @@ <title><emphasis>SECURITY</emphasis> <literal>setgid</literal> directory and <emphasis>sticky bit</emphasis></title> <para>The <literal>setgid</literal> bit also applies to directories. - Any newly-created item in such directories is automaticallly assigned + Any newly-created item in such directories is automatically assigned the owner group of the parent directory, instead of inheriting the creator's main group as usual. This setup avoids the user having to change its main group (with the <command>newgrp</command> command) @@ -1076,7 +1076,7 @@ represents a right to execute which applies only to directories (and not to files lacking this right). Thus, <command>chmod -R a+X <replaceable>directory</replaceable></command> will only add execute - rights for all categoties of users (<literal>a</literal>) for all of + rights for all categories of users (<literal>a</literal>) for all of the sub-directories and files for which at least one category of user (even if their sole owner) already has execute rights.</para> </sidebar> @@ -2395,7 +2395,7 @@ exclude: manner; on first boot (and, more generally, each time that a new network card appears) it uses the name of the network interface and its MAC address to create new rules that will reassign the same - name on subsequents boots. These rules are stored in + name on subsequent boots. These rules are stored in <filename>/etc/udev/rules.d/70-persistent-net.rules</filename>.</para> <para>This mechanism has some side effects that you should know --- a/en-US/10_network-infrastructure.xml +++ b/en-US/10_network-infrastructure.xml @@ -811,7 +811,7 @@ option /etc/ppp/pptpd-options # # Specifies the local and remote IP address ranges. # -# You can specify single IP addresses seperated by commas or you can +# You can specify single IP addresses separated by commas or you can # specify ranges, or both. For example: # # 192.168.0.234,192.168.0.245-249,192.168.0.254 @@ -1093,7 +1093,7 @@ iptables -t mangle -A PREROUTING -p tcp --dport ssh -j TOS --set-tos Minimize-De <para>Dynamic routing allows routers to adjust, in real time, the paths used for transmitting IP packets. Each protocol involves its - own method of defining routes (shortest path, use routes advertized + own method of defining routes (shortest path, use routes advertised by peers, and so on).</para> <para>In the Linux kernel, a route links a network device to a set of @@ -1379,7 +1379,7 @@ if_prefix=eth0 of version, have the same structure.</para> <para>The Falcot administrators created a primary - <literal>falcot.com</literal> zone to store informations related to + <literal>falcot.com</literal> zone to store information related to this domain, and a <literal>168.192.in-addr.arpa</literal> zone for reverse mapping of IP addresses in the local networks.</para> @@ -1848,7 +1848,7 @@ Nmap done: 1 IP address (1 host up) scanned in 21.32 seconds </mediaobject> </figure> - <para>In our example, the packets travelling over SSH are filtered + <para>In our example, the packets traveling over SSH are filtered out (with the <literal>!tcp.port == 22</literal> filter). The packet currently displayed was developed at the TCP and HTTP layers.</para> --- a/en-US/11_network-services.xml +++ b/en-US/11_network-services.xml @@ -728,7 +728,7 @@ body_checks = regexp:/etc/postfix/body_checks <para>The <emphasis>regular expression</emphasis> term (shortened to <emphasis>regexp</emphasis> or <emphasis>regex</emphasis>) - references a generic notation for expressing a descrition of the + references a generic notation for expressing a description of the contents and/or structure of a string of characters. Certain special characters allow defining alternatives (for instance, <literal>foo|bar</literal> matches either “foo” or @@ -1255,7 +1255,7 @@ relay_host = [mail.falcot.com] on the domain name of the web server. The first method requires allocating a different IP address (or port) for each site, whereas the second one can work on a single IP address (and port), and the - sites are differenciated by the hostname sent by the HTTP client + sites are differentiated by the hostname sent by the HTTP client (which only works in version 1.1 of the HTTP protocol — fortunately that version is old enough that all clients use it already).</para> @@ -1265,7 +1265,7 @@ relay_host = [mail.falcot.com] provided for name-based virtual hosting; the SNI extension (<emphasis>Server Name Indication</emphasis>) that allows such a combination is not handled by all browsers. When several HTTPS sites - need to run on the same server, they will usually be differenciated + need to run on the same server, they will usually be differentiated either by running on a different port or on a different IP address (IPv6 can help there).</para> @@ -1451,7 +1451,7 @@ DirectoryIndex index.php index.html index.htm directive</primary></indexterm></para> </listitem> <listitem> - <para><literal>MultiViews</literal> enables content negociation; + <para><literal>MultiViews</literal> enables content negotiation; this can be used by the server to return a web page matching the preferred language as configured in the browser. <indexterm><primary><literal>MultiViews</literal>, Apache @@ -1955,7 +1955,7 @@ options lockd nlm_udpport=2045 nlm_tcpport=2045 this can be disabled with the <literal>async</literal> option. Asynchronous writes increase performance a bit, but they decrease reliability since there's a data loss risk in case of the server - crashing between the acknowledgement of the write and the actual + crashing between the acknowledgment of the write and the actual write on disk. Since the default value changed recently (as compared to the historical value of NFS), an explicit setting is recommended.</para> --- a/en-US/12_advanced-administration.xml +++ b/en-US/12_advanced-administration.xml @@ -47,7 +47,7 @@ with new block devices, which can be used to create filesystems or swap space, without necessarily having them mapped to one physical disk. RAID and LVM come from quite different backgrounds, but their - functionality can overlap somewhat, which is why they are ofter + functionality can overlap somewhat, which is why they are often mentioned together.</para> <sidebar> @@ -119,7 +119,7 @@ <section id="niveaux-de-raid"> <title>Different RAID Levels</title> - <para>RAID has actually several levels, differenciated by their + <para>RAID has actually several levels, differentiated by their layout and the amount of redundancy they provide. The more redundant, the more failure-proof, since the system will be able to keep working with more failed disks. The counterpart is that the @@ -282,7 +282,7 @@ <varlistentry> <term>RAID-1+0</term> <listitem> - <para>This isn't stricly speaking, a RAID level, but a + <para>This isn't strictly speaking, a RAID level, but a stacking of two RAID groupings. Starting from 2×N disks, one first sets them up by pairs into N RAID-1 volumes; these N volumes are then aggregated into one, either by “linear @@ -1211,7 +1211,7 @@ The filesystem on /dev/vg_critical/lv_files is now 1835008 blocks long. <section id="raid-ou-lvm"> <title>RAID or LVM?</title> - <para>RAID and LVM both bring undisputable advantages as soon as one + <para>RAID and LVM both bring indisputable advantages as soon as one leaves the simple case of a desktop computer with a single hard disk where the usage pattern doesn't change over time. However, RAID and LVM go in two different directions, with diverging goals, and it is @@ -1502,7 +1502,7 @@ Disk identifier: 0x00039a9f role="pkg">linux-image-2.6-xen-686</emphasis> and <emphasis role="pkg">linux-image-2.6-xen-amd64</emphasis> packages. This distribution-specific patching means that the available featureset - depends on the distibution; discrepancies in the versions of the + depends on the distribution; discrepancies in the versions of the code, or even integration of code still under development into some distributions also mean differences in the supported features. This problem should be greatly reduced now that Xen has been officially @@ -2388,7 +2388,7 @@ to the console to complete the installation process. left empty in the case of the local host). In addition to that, and in the QEMU/KVM case, each user can manage virtual machines working with restricted permissions, and the URL path allows - differenciating “system” machines + differentiating “system” machines (<literal>/system</literal>) from others (<literal>/session</literal>).</para> </callout> @@ -2566,7 +2566,7 @@ root@server's password: </computeroutput> not update any software on their own, or install any other software. Similarly, security updates must not be automated, because they have to go through the centralized reference image maintained by SystemImager. - This solution also requires the target machines to be homogenous, + This solution also requires the target machines to be homogeneous, otherwise many different images would have to be kept and managed (an i386 image won't fit on a powerpc machine, and so on).</para> @@ -2886,7 +2886,7 @@ append preseed/file=/hd-media/preseed.cfg locale=en_US console-keymaps-at/keymap <command>mkisofs</command> or <command>xorriso</command>. The image directory is finalized after debian-cd's <command>make image-trees</command> step. At that point, we insert the preseed - file into the approriate directory (usually + file into the appropriate directory (usually <filename>$TDIR/squeeze/CD1/</filename>, $TDIR being one of the parameters defined by the <filename>CONF.sh</filename> configuration file). The CD-ROM uses <command>isolinux</command> @@ -3370,7 +3370,7 @@ load.info 5 minute load average objects; in many cases, defining now hosts, services and contacts is a simple matter of deriving from the provided generic objects. The files in <filename>/etc/nagios3/conf.d/</filename> are a good - source of informaton on how they work.</para> + source of information on how they work.</para> <para>The Falcot Corp administrators use the following configuration:</para> --- a/en-US/13_workstation.xml +++ b/en-US/13_workstation.xml @@ -405,7 +405,7 @@ interfacing to GNOME.</para> <para>It took quite some time for the GNOME project to build up this - infrastructure, which can account for a seeminly less mature desktop + infrastructure, which can account for a seemingly less mature desktop than KDE. The usability and accessibility efforts, in particular, are recent, and the benefits have only started to show in the latest versions of the environment.</para> @@ -424,7 +424,7 @@ kind of registry that can be queried and edited with the <command>gconftool-2</command> command-line tool. The administrator can therefore change users' configuration with a simple script. The - following webside lists all information of interest to an + following website lists all information of interest to an administrator tasked to manage GNOME workstations: <ulink type="block" url="http://library.gnome.org/admin/system-admin-guide/stable/"/><ulink @@ -507,7 +507,7 @@ project about the most popular packages. A script is run weekly by <command>cron</command> which sends (by HTTP or email) an anonymized list of the installed packages and the latest access - date for the files they contain. This allows differenciating, + date for the files they contain. This allows differentiating, among the installed packages, those that are actually used.</para> <indexterm><primary><emphasis role="pkg">popularity-contest</emphasis></primary></indexterm> @@ -681,7 +681,7 @@ started reaching the masses, but it was progressively left behind when Microsoft Internet Explorer came around. Faced with this failure, Netscape (the company) decided to “free” its source - code, by realeasing it under a free license, to give it a second + code, by releasing it under a free license, to give it a second life. This was the beginning of the Mozilla project. After many years of development, the results are more than satisfying: the Mozilla project brought forth an HTML rendering engine (called @@ -1085,7 +1085,7 @@ <para>Note that you should not rely on Wine (or similar solutions) without actually testing the particular software: only a real-use test will determine conclusively whether emulation is fully - fuctional.</para> + functional.</para> <sidebar role="fil"> <title><emphasis>ALTERNATIVE</emphasis> Virtual machines</title> --- a/en-US/14_security.xml +++ b/en-US/14_security.xml @@ -68,7 +68,7 @@ <para>The term “risk” is customarily used to refer collectively to these three factors: what to protect, what needs to be prevented from - happening, and who will try to make it happen. Modelling the risk + happening, and who will try to make it happen. Modeling the risk requires answers to these three questions. From this risk model, a security policy can be constructed, and the policy can be implemented with concrete actions.</para> @@ -94,7 +94,7 @@ amount of inconvenience imposed on system users or performance degradation.</para> - <para>Once the risk has been modelled, one can start thinking about + <para>Once the risk has been modeled, one can start thinking about designing an actual security policy.</para> <sidebar> @@ -465,11 +465,11 @@ to the <literal>-p</literal> option and it can be applied to all other conditions too.</para> - <para>The <literal>-s <replaceable>adress</replaceable></literal> + <para>The <literal>-s <replaceable>address</replaceable></literal> or <literal>-s <replaceable>network/mask</replaceable></literal> condition matches the source address of the packet. Correspondingly, <literal>-d - <replaceable>adress</replaceable></literal> or <literal>-d + <replaceable>address</replaceable></literal> or <literal>-d <replaceable>network/mask</replaceable></literal> matches the destination address.</para> @@ -510,7 +510,7 @@ </listitem> <listitem> <para><literal>--log-prefix</literal> allows specifying a text - prefix to differenciate between logged messages;</para> + prefix to differentiate between logged messages;</para> </listitem> <listitem> <para><literal>--log-tcp-sequence</literal>, @@ -689,7 +689,7 @@ iface eth0 inet static directory);</para> </listitem> <listitem> - <para>those cancelling such a qualification + <para>those canceling such a qualification (<filename>/etc/logcheck/cracking.ignore.d/</filename>);</para> </listitem> <listitem> @@ -697,7 +697,7 @@ iface eth0 inet static (<filename>/etc/logcheck/violations.d/</filename>);</para> </listitem> <listitem> - <para>those cancelling this classification + <para>those canceling this classification (<filename>/etc/logcheck/violations.ignore.d/</filename>);</para> </listitem> <listitem> @@ -904,7 +904,7 @@ iface eth0 inet static <para>The first drawback can be avoided by asking <command>debsums</command> to base its checks on a <filename>.deb</filename> package instead of relying on the - <filename>md5sums</filename> file. But that requires dowloading the + <filename>md5sums</filename> file. But that requires downloading the matching <filename>.deb</filename> files first:</para> <screen> @@ -1017,7 +1017,7 @@ iface eth0 inet static <para>The <emphasis role="pkg">chkrootkit</emphasis> and <emphasis role="pkg">rkhunter</emphasis> packages allow looking for <emphasis>rootkits</emphasis> potentially installed on the - system. As a reminder, these are pieces of sofware designed to + system. As a reminder, these are pieces of software designed to hide the compromise of a system while discreetly keeping control of the machine. The tests are not 100% reliable, but they can usually draw the administrator's attention to potential @@ -1179,9 +1179,9 @@ iface eth0 inet static <emphasis>objects</emphasis> (files, directories, sockets, devices, etc.). They can vary from object to object. To achieve this, each object is associated to a <emphasis>type</emphasis> (this is known as - labelling). Domain's rights are thus expressed with sets of + labeling). Domain's rights are thus expressed with sets of (dis)allowed operations on those types (and, indirectly, on all - objects which are labelled with the given type).</para> + objects which are labeled with the given type).</para> <sidebar> <title><emphasis>EXTRA</emphasis> Domains and types are equivalent</title> @@ -1194,8 +1194,8 @@ iface eth0 inet static <para>By default, a program inherits its domain for the user who started it but the standard SELinux policies expect many important programs to run in dedicated domains. To achieve this, those - executables are labelled with a dedicated type (for example - <command>ssh</command> is labelled with + executables are labeled with a dedicated type (for example + <command>ssh</command> is labeled with <literal>ssh_exec_t</literal>, and when the program starts, it automatically switches in the <literal>ssh_t</literal> domain). This automatic domain transition mechanism makes it possible to grant only @@ -1294,9 +1294,9 @@ iface eth0 inet static reboot.</para> <para>It is worth noting that the <command>selinux-activate</command> - script automates those operations and forces a labelling on next boot + script automates those operations and forces a labeling on next boot (which avoids new non-labeled files created while SELinux was not yet - active and while the labelling was going on).</para> + active and while the labeling was going on).</para> </section> <section id="section.selinux-gestion"> <title>Managing an SELinux System</title> @@ -1516,7 +1516,7 @@ user_u user s0 s0 user_r defines the rules. The <filename>.fc</filename> file defines the “file contexts”, that is the types assigned to files related to this module. The data within the <filename>.fc</filename> file are - used during the file labelling step. Finally, the + used during the file labeling step. Finally, the <filename>.if</filename> file defines the interface of the module: it's a set of “public functions” that other modules can use to properly interact with the module that you're creating.</para> @@ -1708,7 +1708,7 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file) <callout arearefs="example.te.interface"> <para><literal>logging_log_file</literal> is an interface provided by the reference policy. It indicates that files - labelled with the given type are log files which ought to + labeled with the given type are log files which ought to benefit from the associated rules (for example granting rights to <command>logrotate</command> so that it can manipulate them).</para> @@ -1748,8 +1748,8 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file) application works and of what kind of data it manages and/or generates.</para> - <para>Howevever, an empirical approach is possible. Once the - relevant objects are correctly labelled, you can use the + <para>However, an empirical approach is possible. Once the + relevant objects are correctly labeled, you can use the application in permissive mode: the operations that would be forbidden are logged but still succeed. By analysing the logs, you can now identify the operations to allow. Here is an example of @@ -1781,7 +1781,7 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file) <entry> <computeroutput>{ read write }</computeroutput> </entry> - <entry>This operation required the <literal>read</literal> and <literal>write</literal> permisions.</entry> + <entry>This operation required the <literal>read</literal> and <literal>write</literal> permissions.</entry> </row> <row> <entry> @@ -1842,7 +1842,7 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file) <command>audit2allow</command> command (of the <emphasis role="pkg">policycoreutils</emphasis> package) offers. This approach is only useful if the various objects are already - correctly labelled according to what must be confined. In any case, + correctly labeled according to what must be confined. In any case, you will have to carefully review the generated rules and validate them according to your knowledge of the application. Effectively, this approach tends to grant more rights than are really required. @@ -2076,7 +2076,7 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file) used to get administrator privileges on the whole machine.</para> <para>By the same reasoning, firewalls will often be configured to - only allow access to services that are meant to be publically + only allow access to services that are meant to be publicly accessible.</para> <para>Current computers are powerful enough to allow hosting several --- a/en-US/15_debian-packaging.xml +++ b/en-US/15_debian-packaging.xml @@ -1014,7 +1014,7 @@ release_label = Internal Packages thing for Debian. This usually implies that the candidate has already been active within the community, and that their work has been appreciated. If the candidate is shy and their work is not - publically touted, they can try to convince a Debian developer to + publicly touted, they can try to convince a Debian developer to advocate them by showing their work in a private way.</para> <para>At the same time, the candidate must generate a @@ -1050,7 +1050,7 @@ release_label = Internal Packages <section> <title>Accepting the Principles</title> - <para>These adminitrative formalities are followed with + <para>These administrative formalities are followed with philosophical considerations. The point is to make sure that the candidate understands and accepts the social contract and the principles behind Free Software. Joining Debian is only possible if --- a/en-US/70_conclusion.xml +++ b/en-US/70_conclusion.xml @@ -75,7 +75,7 @@ new free software project is attracted.</para> <para>Beyond the apparent satisfaction of most Debian users, a deep - trend is becoming more and more undisputable: people are increasingly + trend is becoming more and more indisputable: people are increasingly realising that collaborating, rather than doing business solo, leads to better results for everyone. Such is the rationale used by distributions merging into Debian by way of subprojects.</para> --- a/en-US/92_short-remedial-course.xml +++ b/en-US/92_short-remedial-course.xml @@ -561,7 +561,7 @@ Bus 002 Device 004: ID 413c:8103 Dell Computer Corp. Wireless 350 Bluetooth <indexterm><primary>system, filesystem</primary></indexterm> <para>Filesystems are one of the most prominent aspects of the - kernel. Unix systems merge all the file storages into a single + kernel. Unix systems merge all the file stores into a single hierarchy, which allows users (and applications) to access data simply by knowing its location within that hierarchy.</para> @@ -928,7 +928,7 @@ Bus 002 Device 004: ID 413c:8103 Dell Computer Corp. Wireless 350 Bluetooth family of operating systems is that each tool should only do one thing, and do it well; applications can then reuse these tools to build more advanced logic on top. This Way can be seen in many - incarnations. Shell scripts may be the best example: they assemple + incarnations. Shell scripts may be the best example: they assemble complex sequences of very simple tools (such as <command>grep</command>, <command>wc</command>, <command>sort</command>, <command>uniq</command> and so on).