diff --git a/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml b/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
index 75090f17c1..9a4a344494 100644
--- a/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
+++ b/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
@@ -1104,7 +1104,7 @@ pass inet proto icmp from any to $ext_if keep state
By default, Unix traceroute uses UDP
connections according to a set formula based on
destination. The rule below works with
- traceroute on all unixes I've had
+ traceroute on all Unixes I have had
access to, including GNU/Linux:
# allow out the default range for traceroute(8):
@@ -1125,7 +1125,7 @@ pass out on $ext_if inet proto udp from any to any port 33433 >< 33626 kee
details.
Under any circumstances, this solution was lifted
- from an openbsd-misc post. I've found that list, and
+ from an openbsd-misc post. I have found that list, and
the searchable list archives (accessible among other
places from http://marc.theaimsgroup.com/),
to be a very valuable resource whenever you need OpenBSD
@@ -1290,7 +1290,7 @@ Sep 26 03:12:44 skapet sshd[24703]: Failed password for invalid user admin from
solution. Pass rules can be written so they maintain
certain limits on what connecting hosts can do. For good
measure, violators can be banished to a table of addresses
- which are denied some or all access. If desired, it's even
+ which are denied some or all access. If desired, it is even
possible to drop all existing connections from machines
which overreach the limits. Here is how it is done: