From b94231dacac553c3cfd4d0917f87231a65727bf2 Mon Sep 17 00:00:00 2001 From: Dima Dorfman Date: Sat, 24 Nov 2001 19:47:12 +0000 Subject: [PATCH] Spelling police: "more then" - "more than" where appropriate. --- sbin/ccdconfig/ccdconfig.8 | 2 +- sbin/ifconfig/ifconfig.8 | 2 +- share/man/man7/security.7 | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/sbin/ccdconfig/ccdconfig.8 b/sbin/ccdconfig/ccdconfig.8 index 1e853f4a9718..c2f76c302013 100644 --- a/sbin/ccdconfig/ccdconfig.8 +++ b/sbin/ccdconfig/ccdconfig.8 @@ -182,7 +182,7 @@ until a write error occurs or until you replace either side of the mirror. uses a poor-man's mirroring implementation. It works well enough that if you begin to get disk errors you should be able to backup the ccd disk, replace the broken hardware, and then regenerate the ccd disk. If you need -more then this you should look into external hardware RAID SCSI boxes, +more than this you should look into external hardware RAID SCSI boxes, RAID controllers such as the .Nm dpt controller, or software RAID systems such as diff --git a/sbin/ifconfig/ifconfig.8 b/sbin/ifconfig/ifconfig.8 index 030460b5c078..09604fe7de5b 100644 --- a/sbin/ifconfig/ifconfig.8 +++ b/sbin/ifconfig/ifconfig.8 @@ -575,7 +575,7 @@ string or as a string of hexadecimal digits proceeded by A key may be cleared by setting it to .Ql - . If WEP is supported then there are at least four keys. -Some adaptors support more then four keys. +Some adaptors support more than four keys. If that is the case, then the first four keys (1-4) will be the standard temporary keys and any others will be adaptor specific keys such as permanent keys stored in NVRAM. diff --git a/share/man/man7/security.7 b/share/man/man7/security.7 index e21a6e197bb3..e8b5b6ed2c09 100644 --- a/share/man/man7/security.7 +++ b/share/man/man7/security.7 @@ -90,7 +90,7 @@ the attacker can break root. However, the reality is that in a well secured and maintained system, access to a user account does not necessarily give the attacker access to root. The distinction is important because without access to root the attacker cannot generally hide his tracks and may, at best, be -able to do nothing more then mess with the user's files or crash the machine. +able to do nothing more than mess with the user's files or crash the machine. User account compromises are very common because users tend not to take the precautions that sysads take. .Pp