From f0b4dca59b3fc5dbc1e378c57b98c8cc44b24d47 Mon Sep 17 00:00:00 2001 From: Dru Lavigne Date: Fri, 4 Apr 2014 15:49:45 +0000 Subject: [PATCH] Fix 2 grammos. Sponsored by: iXsystems --- en_US.ISO8859-1/books/handbook/security/chapter.xml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/en_US.ISO8859-1/books/handbook/security/chapter.xml b/en_US.ISO8859-1/books/handbook/security/chapter.xml index 945175c1f3..4c4d635287 100644 --- a/en_US.ISO8859-1/books/handbook/security/chapter.xml +++ b/en_US.ISO8859-1/books/handbook/security/chapter.xml @@ -1449,7 +1449,7 @@ jdoe@example.org Client applications may also use slightly different command line options to accomplish the same tasks. Following - the instructions at Kerberos http://web.mit.edu/Kerberos/www/ is recommended. Be careful of path issues: the MIT port installs into @@ -1681,7 +1681,7 @@ kadmind5_server_enable="YES" &man.ssh.1; Kerberos is an excellent authentication protocol, but - there are bugs in the kerberized versions of + there are bugs in the Kerberized versions of telnet and rlogin that make them unsuitable for dealing with binary streams. By default, Kerberos does not encrypt a session unless