Correct some misuses of "its" and "it's".

Also expand some contractions of the same, discovered while I was
hunting down all of the above.

This commit can very likely be ignored by translation teams, as I doubt
that this problem transcends languages.
This commit is contained in:
Ceri Davies 2003-11-23 17:52:12 +00:00
parent 63c83e6634
commit 9b7a21de42
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=18962
8 changed files with 17 additions and 17 deletions

View file

@ -1395,7 +1395,7 @@ Protocol Descriptor List:
<sect2>
<title>OBEX Push (OPUSH) Profile</title>
<para>OBEX is a widely used protocol for simple file transfers between
mobile devices. It's main use is in infrared communication, where it is
mobile devices. Its main use is in infrared communication, where it is
used for generic file transfers between notebooks or Palm handhelds,
and for sending business cards or calendar entries between cellular
phones and other devices with PIM applications.</para>

View file

@ -1439,7 +1439,7 @@ total 530
be checked. File systems that should be skipped should have
their <literal>passno</literal> set to zero. The root
file system (which needs to be checked before everything
else) should have it's <literal>passno</literal> set to
else) should have its <literal>passno</literal> set to
one, and other file systems' <literal>passno</literal>
should be set to values greater than one. If more than one
file systems have the same <literal>passno</literal> then

View file

@ -508,7 +508,7 @@ HOME=/var/log
<literal>*</literal> characters. These <literal>*</literal> characters
mean <quote>first-last</quote>, and can be interpreted as
<emphasis>every</emphasis> time. So, judging by this line,
its apparent that the <command>atrun</command> command is to be invoked by
it is apparent that the <command>atrun</command> command is to be invoked by
<username>root</username> every five minutes regardless of what
day or month it is. For more information on the <command>atrun</command>,
see the &man.atrun.8; manual page.</para>
@ -614,7 +614,7 @@ HOME=/var/log
<screen>&prompt.root; <userinput>/etc/rc.d/sshd forcerestart</userinput></screen>
<para>It's easy to check if a service is enabled in
<para>It is easy to check if a service is enabled in
<filename>/etc/rc.conf</filename> by running the appropriate
<filename>rc.d</filename> script with the option
<option>rcvar</option>. Thus, an administrator can check that
@ -1896,7 +1896,7 @@ kern.maxfiles: 2088 -> 5000</screen>
is recommended to increase this value to <literal>1024</literal> or
higher. The service daemon may itself limit the listen queue size
(e.g. &man.sendmail.8;, or <application>Apache</application>) but
will often have a directive in it's configuration file to adjust
will often have a directive in its configuration file to adjust
the queue size. Large listen queues also do a better job of
avoiding Denial of Service (<abbrev>DoS</abbrev>) attacks.</para>
</sect3>

View file

@ -1250,8 +1250,8 @@ Mounting root from ufs:/dev/md0c
them correctly.</para>
<para>If you need to make changes to the UserConfig device probing,
it's easy to exit the <application>sysinstall</application> program
and start over again. It's also a good way to become more familiar
it is easy to exit the <application>sysinstall</application> program
and start over again. It is also a good way to become more familiar
with the process.</para>
<figure id="sysinstall-exit">
@ -3389,7 +3389,7 @@ To change any of these settings later, edit /etc/rc.conf
task for new users if they lack previous
knowledge in this area. Networking, including the Internet,
is critical to all modern operating systems including &os;;
as a result, it's very useful to have some understanding
as a result, it is very useful to have some understanding
&os;'s extensive networking capabilities. Doing this
during the installation will ensure users have some
understanding of the various services available to them.</para>

View file

@ -435,7 +435,7 @@
non-existent. See the <filename>NOTES</filename> file for
architecture dependent options. Some options, mainly
architecture independent ones, are stored in the
<filename>/usr/src/sys/conf/NOTES</filename> file. It's
<filename>/usr/src/sys/conf/NOTES</filename> file. It is
advisable to review the options in here also.</para></note>
<indexterm>

View file

@ -1051,7 +1051,7 @@ freefall MX 20 who.cdrom.com</programlisting>
<para>As you can see, <hostid>freefall</hostid> had many MX entries.
The lowest MX number is the host that receives mail directly if
available; if it's not accessible for some reason, the others
available; if it is not accessible for some reason, the others
(sometimes called <quote>backup MXes</quote>) accept messages
temporarily, and pass it along when a lower-numbered host becomes
available, eventually to the lowest-numbered host.</para>

View file

@ -1980,7 +1980,7 @@ type '~h' for help</programlisting>
<para>If you connect fine, but cannot seem to find any domain
name, try to use &man.ping.8; with an <acronym>IP</acronym>
address and see if you can get any return information. If
you experience 100 percent (100%) packet loss, then its most
you experience 100 percent (100%) packet loss, then it is most
likely that you were not assigned a default route. Double
check that the option <option>add default HISADDR</option>
was set during the connection. If you can connect to a

View file

@ -2168,7 +2168,7 @@ _kerberos IN TXT EXAMPLE.ORG.</programlisting></note>
Password: <userinput>xxxxxxxx</userinput>
Verifying password - Password: <userinput>xxxxxxxx</userinput></screen>
<para>Now it's time to start up the <acronym>KDC</acronym> services.
<para>Now it is time to start up the <acronym>KDC</acronym> services.
Run <command>/etc/rc.d/kerberos start</command> and
<command>/etc/rc.d/kadmind start</command> to bring up the
services. Note that you won't have any kerberized daemons running
@ -2483,7 +2483,7 @@ _kerberos IN TXT EXAMPLE.ORG.</programlisting></note>
<acronym>TGT</acronym> is encrypted in a key derived from
the user's password. Therefore, when a user types their
password it is not being sent to the <acronym>KDC</acronym>,
it's being used to decrypt the <acronym>TGT</acronym> that
it is being used to decrypt the <acronym>TGT</acronym> that
<command>kinit</command> already obtained. If the decryption
process results in a valid ticket with a valid time stamp,
the user has valid <application>Kerberos</application>
@ -2493,7 +2493,7 @@ _kerberos IN TXT EXAMPLE.ORG.</programlisting></note>
well as the actual ticket-granting ticket, which is actually
encrypted with the <application>Kerberos</application>
server's own key. This second layer of encryption is
unknown to the user, but it's what allows the
unknown to the user, but it is what allows the
<application>Kerberos</application> server to verify
the authenticity of each <acronym>TGT</acronym>.</para></note>
</listitem>
@ -4102,8 +4102,8 @@ Destination Gateway Flags Refs Use Netif Expire
reach hosts on the other network.</para>
<para>That has now created two thirds of a VPN between the two
networks, in as much as it's <quote>virtual</quote> and it's a
<quote>network</quote>. It's not private yet. You can test
networks, in as much as it is <quote>virtual</quote> and it is a
<quote>network</quote>. It is not private yet. You can test
this using &man.ping.8; and &man.tcpdump.1;. Log in to the
gateway host and run</para>
@ -4212,7 +4212,7 @@ options IPSEC_ESP
and so forth, or you can use daemons that implement the Internet
Key Exchange protocol (IKE) to do this for you.</para>
<para>I recommend the latter. Apart from anything else, it's
<para>I recommend the latter. Apart from anything else, it is
easier to set up.</para>
<para>Editing and displaying security policies is carried out