Correct some misuses of "its" and "it's".

Also expand some contractions of the same, discovered while I was
hunting down all of the above.

This commit can very likely be ignored by translation teams, as I doubt
that this problem transcends languages.
This commit is contained in:
Ceri Davies 2003-11-23 17:52:12 +00:00
parent 63c83e6634
commit 9b7a21de42
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=18962
8 changed files with 17 additions and 17 deletions

View file

@ -1395,7 +1395,7 @@ Protocol Descriptor List:
<sect2> <sect2>
<title>OBEX Push (OPUSH) Profile</title> <title>OBEX Push (OPUSH) Profile</title>
<para>OBEX is a widely used protocol for simple file transfers between <para>OBEX is a widely used protocol for simple file transfers between
mobile devices. It's main use is in infrared communication, where it is mobile devices. Its main use is in infrared communication, where it is
used for generic file transfers between notebooks or Palm handhelds, used for generic file transfers between notebooks or Palm handhelds,
and for sending business cards or calendar entries between cellular and for sending business cards or calendar entries between cellular
phones and other devices with PIM applications.</para> phones and other devices with PIM applications.</para>

View file

@ -1439,7 +1439,7 @@ total 530
be checked. File systems that should be skipped should have be checked. File systems that should be skipped should have
their <literal>passno</literal> set to zero. The root their <literal>passno</literal> set to zero. The root
file system (which needs to be checked before everything file system (which needs to be checked before everything
else) should have it's <literal>passno</literal> set to else) should have its <literal>passno</literal> set to
one, and other file systems' <literal>passno</literal> one, and other file systems' <literal>passno</literal>
should be set to values greater than one. If more than one should be set to values greater than one. If more than one
file systems have the same <literal>passno</literal> then file systems have the same <literal>passno</literal> then

View file

@ -508,7 +508,7 @@ HOME=/var/log
<literal>*</literal> characters. These <literal>*</literal> characters <literal>*</literal> characters. These <literal>*</literal> characters
mean <quote>first-last</quote>, and can be interpreted as mean <quote>first-last</quote>, and can be interpreted as
<emphasis>every</emphasis> time. So, judging by this line, <emphasis>every</emphasis> time. So, judging by this line,
its apparent that the <command>atrun</command> command is to be invoked by it is apparent that the <command>atrun</command> command is to be invoked by
<username>root</username> every five minutes regardless of what <username>root</username> every five minutes regardless of what
day or month it is. For more information on the <command>atrun</command>, day or month it is. For more information on the <command>atrun</command>,
see the &man.atrun.8; manual page.</para> see the &man.atrun.8; manual page.</para>
@ -614,7 +614,7 @@ HOME=/var/log
<screen>&prompt.root; <userinput>/etc/rc.d/sshd forcerestart</userinput></screen> <screen>&prompt.root; <userinput>/etc/rc.d/sshd forcerestart</userinput></screen>
<para>It's easy to check if a service is enabled in <para>It is easy to check if a service is enabled in
<filename>/etc/rc.conf</filename> by running the appropriate <filename>/etc/rc.conf</filename> by running the appropriate
<filename>rc.d</filename> script with the option <filename>rc.d</filename> script with the option
<option>rcvar</option>. Thus, an administrator can check that <option>rcvar</option>. Thus, an administrator can check that
@ -1896,7 +1896,7 @@ kern.maxfiles: 2088 -> 5000</screen>
is recommended to increase this value to <literal>1024</literal> or is recommended to increase this value to <literal>1024</literal> or
higher. The service daemon may itself limit the listen queue size higher. The service daemon may itself limit the listen queue size
(e.g. &man.sendmail.8;, or <application>Apache</application>) but (e.g. &man.sendmail.8;, or <application>Apache</application>) but
will often have a directive in it's configuration file to adjust will often have a directive in its configuration file to adjust
the queue size. Large listen queues also do a better job of the queue size. Large listen queues also do a better job of
avoiding Denial of Service (<abbrev>DoS</abbrev>) attacks.</para> avoiding Denial of Service (<abbrev>DoS</abbrev>) attacks.</para>
</sect3> </sect3>

View file

@ -1250,8 +1250,8 @@ Mounting root from ufs:/dev/md0c
them correctly.</para> them correctly.</para>
<para>If you need to make changes to the UserConfig device probing, <para>If you need to make changes to the UserConfig device probing,
it's easy to exit the <application>sysinstall</application> program it is easy to exit the <application>sysinstall</application> program
and start over again. It's also a good way to become more familiar and start over again. It is also a good way to become more familiar
with the process.</para> with the process.</para>
<figure id="sysinstall-exit"> <figure id="sysinstall-exit">
@ -3389,7 +3389,7 @@ To change any of these settings later, edit /etc/rc.conf
task for new users if they lack previous task for new users if they lack previous
knowledge in this area. Networking, including the Internet, knowledge in this area. Networking, including the Internet,
is critical to all modern operating systems including &os;; is critical to all modern operating systems including &os;;
as a result, it's very useful to have some understanding as a result, it is very useful to have some understanding
&os;'s extensive networking capabilities. Doing this &os;'s extensive networking capabilities. Doing this
during the installation will ensure users have some during the installation will ensure users have some
understanding of the various services available to them.</para> understanding of the various services available to them.</para>

View file

@ -435,7 +435,7 @@
non-existent. See the <filename>NOTES</filename> file for non-existent. See the <filename>NOTES</filename> file for
architecture dependent options. Some options, mainly architecture dependent options. Some options, mainly
architecture independent ones, are stored in the architecture independent ones, are stored in the
<filename>/usr/src/sys/conf/NOTES</filename> file. It's <filename>/usr/src/sys/conf/NOTES</filename> file. It is
advisable to review the options in here also.</para></note> advisable to review the options in here also.</para></note>
<indexterm> <indexterm>

View file

@ -1051,7 +1051,7 @@ freefall MX 20 who.cdrom.com</programlisting>
<para>As you can see, <hostid>freefall</hostid> had many MX entries. <para>As you can see, <hostid>freefall</hostid> had many MX entries.
The lowest MX number is the host that receives mail directly if The lowest MX number is the host that receives mail directly if
available; if it's not accessible for some reason, the others available; if it is not accessible for some reason, the others
(sometimes called <quote>backup MXes</quote>) accept messages (sometimes called <quote>backup MXes</quote>) accept messages
temporarily, and pass it along when a lower-numbered host becomes temporarily, and pass it along when a lower-numbered host becomes
available, eventually to the lowest-numbered host.</para> available, eventually to the lowest-numbered host.</para>

View file

@ -1980,7 +1980,7 @@ type '~h' for help</programlisting>
<para>If you connect fine, but cannot seem to find any domain <para>If you connect fine, but cannot seem to find any domain
name, try to use &man.ping.8; with an <acronym>IP</acronym> name, try to use &man.ping.8; with an <acronym>IP</acronym>
address and see if you can get any return information. If address and see if you can get any return information. If
you experience 100 percent (100%) packet loss, then its most you experience 100 percent (100%) packet loss, then it is most
likely that you were not assigned a default route. Double likely that you were not assigned a default route. Double
check that the option <option>add default HISADDR</option> check that the option <option>add default HISADDR</option>
was set during the connection. If you can connect to a was set during the connection. If you can connect to a

View file

@ -2168,7 +2168,7 @@ _kerberos IN TXT EXAMPLE.ORG.</programlisting></note>
Password: <userinput>xxxxxxxx</userinput> Password: <userinput>xxxxxxxx</userinput>
Verifying password - Password: <userinput>xxxxxxxx</userinput></screen> Verifying password - Password: <userinput>xxxxxxxx</userinput></screen>
<para>Now it's time to start up the <acronym>KDC</acronym> services. <para>Now it is time to start up the <acronym>KDC</acronym> services.
Run <command>/etc/rc.d/kerberos start</command> and Run <command>/etc/rc.d/kerberos start</command> and
<command>/etc/rc.d/kadmind start</command> to bring up the <command>/etc/rc.d/kadmind start</command> to bring up the
services. Note that you won't have any kerberized daemons running services. Note that you won't have any kerberized daemons running
@ -2483,7 +2483,7 @@ _kerberos IN TXT EXAMPLE.ORG.</programlisting></note>
<acronym>TGT</acronym> is encrypted in a key derived from <acronym>TGT</acronym> is encrypted in a key derived from
the user's password. Therefore, when a user types their the user's password. Therefore, when a user types their
password it is not being sent to the <acronym>KDC</acronym>, password it is not being sent to the <acronym>KDC</acronym>,
it's being used to decrypt the <acronym>TGT</acronym> that it is being used to decrypt the <acronym>TGT</acronym> that
<command>kinit</command> already obtained. If the decryption <command>kinit</command> already obtained. If the decryption
process results in a valid ticket with a valid time stamp, process results in a valid ticket with a valid time stamp,
the user has valid <application>Kerberos</application> the user has valid <application>Kerberos</application>
@ -2493,7 +2493,7 @@ _kerberos IN TXT EXAMPLE.ORG.</programlisting></note>
well as the actual ticket-granting ticket, which is actually well as the actual ticket-granting ticket, which is actually
encrypted with the <application>Kerberos</application> encrypted with the <application>Kerberos</application>
server's own key. This second layer of encryption is server's own key. This second layer of encryption is
unknown to the user, but it's what allows the unknown to the user, but it is what allows the
<application>Kerberos</application> server to verify <application>Kerberos</application> server to verify
the authenticity of each <acronym>TGT</acronym>.</para></note> the authenticity of each <acronym>TGT</acronym>.</para></note>
</listitem> </listitem>
@ -4102,8 +4102,8 @@ Destination Gateway Flags Refs Use Netif Expire
reach hosts on the other network.</para> reach hosts on the other network.</para>
<para>That has now created two thirds of a VPN between the two <para>That has now created two thirds of a VPN between the two
networks, in as much as it's <quote>virtual</quote> and it's a networks, in as much as it is <quote>virtual</quote> and it is a
<quote>network</quote>. It's not private yet. You can test <quote>network</quote>. It is not private yet. You can test
this using &man.ping.8; and &man.tcpdump.1;. Log in to the this using &man.ping.8; and &man.tcpdump.1;. Log in to the
gateway host and run</para> gateway host and run</para>
@ -4212,7 +4212,7 @@ options IPSEC_ESP
and so forth, or you can use daemons that implement the Internet and so forth, or you can use daemons that implement the Internet
Key Exchange protocol (IKE) to do this for you.</para> Key Exchange protocol (IKE) to do this for you.</para>
<para>I recommend the latter. Apart from anything else, it's <para>I recommend the latter. Apart from anything else, it is
easier to set up.</para> easier to set up.</para>
<para>Editing and displaying security policies is carried out <para>Editing and displaying security policies is carried out