Spelling police: "more then" - "more than" where appropriate.

This commit is contained in:
Dima Dorfman 2001-11-24 19:47:12 +00:00
parent 0dbd8b1b08
commit b94231daca
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=86875
3 changed files with 3 additions and 3 deletions

View File

@ -182,7 +182,7 @@ until a write error occurs or until you replace either side of the mirror.
uses a poor-man's mirroring implementation. It works well enough that if
you begin to get disk errors you should be able to backup the ccd disk,
replace the broken hardware, and then regenerate the ccd disk. If you need
more then this you should look into external hardware RAID SCSI boxes,
more than this you should look into external hardware RAID SCSI boxes,
RAID controllers such as the
.Nm dpt
controller, or software RAID systems such as

View File

@ -575,7 +575,7 @@ string or as a string of hexadecimal digits proceeded by
A key may be cleared by setting it to
.Ql - .
If WEP is supported then there are at least four keys.
Some adaptors support more then four keys.
Some adaptors support more than four keys.
If that is the case, then the first four keys
(1-4) will be the standard temporary keys and any others will be adaptor
specific keys such as permanent keys stored in NVRAM.

View File

@ -90,7 +90,7 @@ the attacker can break root. However, the reality is that in a well secured
and maintained system, access to a user account does not necessarily give the
attacker access to root. The distinction is important because without access
to root the attacker cannot generally hide his tracks and may, at best, be
able to do nothing more then mess with the user's files or crash the machine.
able to do nothing more than mess with the user's files or crash the machine.
User account compromises are very common because users tend not to take the
precautions that sysads take.
.Pp