diff --git a/en_US.ISO8859-1/books/handbook/security/chapter.sgml b/en_US.ISO8859-1/books/handbook/security/chapter.sgml
index 559f04205a..8806d066cb 100644
--- a/en_US.ISO8859-1/books/handbook/security/chapter.sgml
+++ b/en_US.ISO8859-1/books/handbook/security/chapter.sgml
@@ -1506,7 +1506,7 @@ README krb.conf krb.realms
You should now edit the krb.conf and
krb.realms files to define your Kerberos realm.
- In this case the realm will be EXAMPLE.COM and the
+ In this case the realm will be EXAMPLE.COM and the
server is grunt.example.com. We edit
or create the krb.conf file:
@@ -1535,9 +1535,9 @@ ARC.NASA.GOV trident.arc.nasa.gov
of these terms, please consult the Kerberos manual pages.
Now we have to add grunt.example.com
- to the EXAMPLE.COM realm and also add an entry to
+ to the EXAMPLE.COM realm and also add an entry to
put all hosts in the .example.com
- domain in the EXAMPLE.COM realm. The
+ domain in the EXAMPLE.COM realm. The
krb.realms file would be updated as
follows:
@@ -1569,7 +1569,7 @@ It is important that you NOT FORGET this password.
Now we have to save the key so that servers on the local machine
can pick it up. Use the kstash command to do
- this.
+ this:
&prompt.root; kstash
@@ -1588,7 +1588,7 @@ Master key entered. BEWARE!
Two principals need to be added to the database for
each system that will be secured with Kerberos.
- Their names are kpasswd and rcmd
+ Their names are kpasswd and rcmd.
These two principals are made for each system, with the instance being
the name of the individual system.