Fix some typos.

This commit is contained in:
Marc Fonvieille 2007-03-25 10:21:04 +00:00
parent f7b145b38a
commit 5461d4406d
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=29864

View file

@ -1,5 +1,5 @@
<!DOCTYPE HTML PUBLIC "-//FreeBSD//DTD HTML 4.01 Transitional-Based Extension//EN" [ <!DOCTYPE HTML PUBLIC "-//FreeBSD//DTD HTML 4.01 Transitional-Based Extension//EN" [
<!ENTITY date "$FreeBSD: www/en/features.sgml,v 1.27 2005/10/04 20:06:57 hrs Exp $"> <!ENTITY date "$FreeBSD: www/en/features.sgml,v 1.28 2006/08/19 21:20:30 hrs Exp $">
<!ENTITY title "About FreeBSD's Technological Advances"> <!ENTITY title "About FreeBSD's Technological Advances">
<!ENTITY % navinclude.about "INCLUDE"> <!ENTITY % navinclude.about "INCLUDE">
]> ]>
@ -87,7 +87,7 @@
CPU-intensive I/O optimization.</li> CPU-intensive I/O optimization.</li>
<li><b>M:N application threading via pthreads</b> permitting threads <li><b>M:N application threading via pthreads</b> permitting threads
to execute on multiple CPUs in a scaleable manner, mapping many user to execute on multiple CPUs in a scalable manner, mapping many user
threads onto a small number of <b>Kernel Schedulable Entities</b>. threads onto a small number of <b>Kernel Schedulable Entities</b>.
By adopting the <b>Scheduler Activation</b> model, the threading By adopting the <b>Scheduler Activation</b> model, the threading
approach can be adapted to the specific requirements of a broad approach can be adapted to the specific requirements of a broad
@ -105,7 +105,7 @@
which allows developers to customize the operating system security which allows developers to customize the operating system security
model for specific environments, from creating hardening policies model for specific environments, from creating hardening policies
to deploying mandatory labeled confidentiality of integrity to deploying mandatory labeled confidentiality of integrity
policies. Sample seucrity policies include <b>Multi-Level policies. Sample security policies include <b>Multi-Level
Security (MLS)</b>, and <b>Biba Integrity Protection</b>. Third Security (MLS)</b>, and <b>Biba Integrity Protection</b>. Third
party modules include <b>SEBSD</b>, a FLASK-based implementation party modules include <b>SEBSD</b>, a FLASK-based implementation
of <b>Type Enforcement</b>.</li> of <b>Type Enforcement</b>.</li>