Fill paragraphs and fix some misindentation. No content changes.

This commit is contained in:
Dima Dorfman 2001-08-31 16:26:23 +00:00
parent 347fa35657
commit b0b5e7861e
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=10513

View file

@ -17,7 +17,7 @@
<corpauthor>The FreeBSD Documentation Project</corpauthor>
<pubdate>$FreeBSD: doc/en_US.ISO8859-1/books/faq/book.sgml,v 1.257 2001/08/23 22:06:11 dd Exp $</pubdate>
<pubdate>$FreeBSD: doc/en_US.ISO8859-1/books/faq/book.sgml,v 1.258 2001/08/31 16:14:25 dd Exp $</pubdate>
<copyright>
<year>1995</year>
@ -2178,21 +2178,21 @@ Filesystem 1024-blocks Used Avail Capacity Mounted on
<para>A <quote>security profile</quote> is a set of configuration
options that attempts to achieve the desired ratio of security
to convenience by enabling and disabling certain programs and
other settings. The more severe the security profile, the fewer
programs will be enabled by
default. This is one of the basic principles of security:
do not run anything except what you must.</para>
other settings. The more severe the security profile, the
fewer programs will be enabled by default. This is one of the
basic principles of security: do not run anything except what
you must.</para>
<para>Please note that the security profile is just a default
setting. All programs can be enabled and disabled after you have
installed FreeBSD by editing or adding the appropriate line(s)
to <filename>/etc/rc.conf</filename>. For more information,
please see the &man.rc.conf.5; manual page.</para>
setting. All programs can be enabled and disabled after you
have installed FreeBSD by editing or adding the appropriate
line(s) to <filename>/etc/rc.conf</filename>. For more
information, please see the &man.rc.conf.5; manual page.</para>
<para>The following table describes what each of the
security profiles do. The columns are the choices you
have for a security profile, and the rows are the program
or feature that the profile enables or disables.</para>
<para>The following table describes what each of the security
profiles do. The columns are the choices you have for a
security profile, and the rows are the program or feature that
the profile enables or disables.</para>
<table>
<title>Possible security profiles</title>
@ -2231,13 +2231,13 @@ Filesystem 1024-blocks Used Avail Capacity Mounted on
<entry>NO</entry>
<entry>MAYBE <footnote>
<para>The portmapper is enabled if the machine has been
configured as an NFS client or server earlier in the
installation.</para>
</footnote>
</entry>
<entry>MAYBE
<footnote>
<para>The portmapper is enabled if the machine has
been configured as an NFS client or server earlier
in the installation.</para>
</footnote>
</entry>
</row>
<row>
@ -2251,15 +2251,16 @@ Filesystem 1024-blocks Used Avail Capacity Mounted on
<row>
<entry>&man.securelevel.8;</entry>
<entry>YES (2) <footnote>
<para>If you choose a security profile that sets the
securelevel (Extreme or High), you must be aware of the
implications. Please read the &man.init.8; manual page
and pay particular attention to the meanings of the
security levels, or you may have significant trouble
later!</para>
<entry>YES (2)
<footnote>
<para>If you choose a security profile that sets the
securelevel (Extreme or High), you must be aware
of the implications. Please read the &man.init.8;
manual page and pay particular attention to the
meanings of the security levels, or you may have
significant trouble later!</para>
</footnote>
</entry>
</entry>
<entry>NO</entry>
</row>