From 6ef8ab490740d1dd4f79e825952ff1c664c6b027 Mon Sep 17 00:00:00 2001 From: Dima Dorfman Date: Fri, 6 Jul 2001 12:39:13 +0000 Subject: [PATCH] Correct a typo. PR: 28722 Submitted by: Joseph Mallett --- en_US.ISO8859-1/articles/contributing/article.sgml | 4 ++-- en_US.ISO8859-1/books/handbook/contrib/chapter.sgml | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/en_US.ISO8859-1/articles/contributing/article.sgml b/en_US.ISO8859-1/articles/contributing/article.sgml index b67d18c751..fcb5cd7381 100644 --- a/en_US.ISO8859-1/articles/contributing/article.sgml +++ b/en_US.ISO8859-1/articles/contributing/article.sgml @@ -1,7 +1,7 @@ @@ -157,7 +157,7 @@ Make it possible to upload a list of allowed - program to BPF, and then block BPF from accepting other + programs to BPF, and then block BPF from accepting other programs. This would allow BPF to be used e.g. for DHCP, without allowing an attacker to start snooping the local network. diff --git a/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml b/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml index b67d18c751..fcb5cd7381 100644 --- a/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml +++ b/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml @@ -1,7 +1,7 @@ @@ -157,7 +157,7 @@ Make it possible to upload a list of allowed - program to BPF, and then block BPF from accepting other + programs to BPF, and then block BPF from accepting other programs. This would allow BPF to be used e.g. for DHCP, without allowing an attacker to start snooping the local network.