From 3604f5fad7bf487cd01fe8a36cc70cfa4629f737 Mon Sep 17 00:00:00 2001 From: dd Date: Sat, 24 Nov 2001 19:47:12 +0000 Subject: Spelling police: "more then" - "more than" where appropriate. --- sbin/ccdconfig/ccdconfig.8 | 2 +- sbin/ifconfig/ifconfig.8 | 2 +- share/man/man7/security.7 | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/sbin/ccdconfig/ccdconfig.8 b/sbin/ccdconfig/ccdconfig.8 index 1e853f4..c2f76c3 100644 --- a/sbin/ccdconfig/ccdconfig.8 +++ b/sbin/ccdconfig/ccdconfig.8 @@ -182,7 +182,7 @@ until a write error occurs or until you replace either side of the mirror. uses a poor-man's mirroring implementation. It works well enough that if you begin to get disk errors you should be able to backup the ccd disk, replace the broken hardware, and then regenerate the ccd disk. If you need -more then this you should look into external hardware RAID SCSI boxes, +more than this you should look into external hardware RAID SCSI boxes, RAID controllers such as the .Nm dpt controller, or software RAID systems such as diff --git a/sbin/ifconfig/ifconfig.8 b/sbin/ifconfig/ifconfig.8 index 030460b..09604fe 100644 --- a/sbin/ifconfig/ifconfig.8 +++ b/sbin/ifconfig/ifconfig.8 @@ -575,7 +575,7 @@ string or as a string of hexadecimal digits proceeded by A key may be cleared by setting it to .Ql - . If WEP is supported then there are at least four keys. -Some adaptors support more then four keys. +Some adaptors support more than four keys. If that is the case, then the first four keys (1-4) will be the standard temporary keys and any others will be adaptor specific keys such as permanent keys stored in NVRAM. diff --git a/share/man/man7/security.7 b/share/man/man7/security.7 index e21a6e1..e8b5b6e 100644 --- a/share/man/man7/security.7 +++ b/share/man/man7/security.7 @@ -90,7 +90,7 @@ the attacker can break root. However, the reality is that in a well secured and maintained system, access to a user account does not necessarily give the attacker access to root. The distinction is important because without access to root the attacker cannot generally hide his tracks and may, at best, be -able to do nothing more then mess with the user's files or crash the machine. +able to do nothing more than mess with the user's files or crash the machine. User account compromises are very common because users tend not to take the precautions that sysads take. .Pp -- cgit v1.1