From 6ef8ab490740d1dd4f79e825952ff1c664c6b027 Mon Sep 17 00:00:00 2001
From: Dima Dorfman
Date: Fri, 6 Jul 2001 12:39:13 +0000
Subject: [PATCH] Correct a typo.
PR: 28722
Submitted by: Joseph Mallett
---
en_US.ISO8859-1/articles/contributing/article.sgml | 4 ++--
en_US.ISO8859-1/books/handbook/contrib/chapter.sgml | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/en_US.ISO8859-1/articles/contributing/article.sgml b/en_US.ISO8859-1/articles/contributing/article.sgml
index b67d18c751..fcb5cd7381 100644
--- a/en_US.ISO8859-1/articles/contributing/article.sgml
+++ b/en_US.ISO8859-1/articles/contributing/article.sgml
@@ -1,7 +1,7 @@
@@ -157,7 +157,7 @@
Make it possible to upload a list of allowed
- program
to BPF, and then block BPF from accepting other
+ programs to BPF, and then block BPF from accepting other
programs. This would allow BPF to be used e.g. for DHCP,
without allowing an attacker to start snooping the local
network.
diff --git a/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml b/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml
index b67d18c751..fcb5cd7381 100644
--- a/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml
+++ b/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml
@@ -1,7 +1,7 @@
@@ -157,7 +157,7 @@
Make it possible to upload a list of allowed
- program
to BPF, and then block BPF from accepting other
+ programs to BPF, and then block BPF from accepting other
programs. This would allow BPF to be used e.g. for DHCP,
without allowing an attacker to start snooping the local
network.