Fix a bunch of spelling errors in a bunch of man pages.

This commit is contained in:
Mike Pritchard 1996-01-30 13:52:50 +00:00
parent e407db3cbc
commit 4a8d02835c
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=13744
77 changed files with 227 additions and 227 deletions

View file

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" From: @(#)sysctl.8 8.1 (Berkeley) 6/6/93
.\" $Id: sysctl.8,v 1.6 1995/02/20 19:42:42 guido Exp $
.\" $Id: sysctl.8,v 1.7 1995/12/21 12:39:24 phk Exp $
.\"
.Dd September 23, 1994
.Dt SYSCTL 8
@ -113,7 +113,7 @@ purpose programs such as
and
.Nm netstat .
.Pp
The string and integer information is summaried below.
The string and integer information is summarized below.
For a detailed description of these variable see
.Xr sysctl 3 .
.Pp
@ -235,7 +235,7 @@ definitions for fourth level UDP identifiers
.Sh BUGS
.Nm sysctl
presently exploits an undocumented interface to the kernel
sysctl facility to traverse the sysctl tree and to retrive format
sysctl facility to traverse the sysctl tree and to retrieve format
and name information.
This correct interface is being thought about for the time being.
.Sh HISTORY

View file

@ -53,7 +53,7 @@
.Li /* round to minus infinity */
.br
.Ft FP_RP,
.Li /* round to plus inifinity */
.Li /* round to plus infinity */
.br
.Ft FP_RZ,
.Li /* truncate */

View file

@ -139,14 +139,14 @@ Sets the buffer length for reads on
files. The buffer must be set before the file is attached to an interface
with
.Dv BIOCSETIF .
If the requested buffer size cannot be accomodated, the closest
If the requested buffer size cannot be accommodated, the closest
allowable size will be set and returned in the argument.
A read call will result in
.Er EIO
if it is passed a buffer that is not this size.
.It Dv BIOCGDLT
.Pq Li u_int
Returns the type of the data link layer underyling the attached interface.
Returns the type of the data link layer underlying the attached interface.
.Er EINVAL
is returned if no interface has been specified.
The device types, prefixed with
@ -249,7 +249,7 @@ See section
for an explanation of the filter language.
.It Dv BIOCVERSION
.Pq Li "struct bpf_version"
Returns the major and minor version numbers of the filter languange currently
Returns the major and minor version numbers of the filter language currently
recognized by the kernel. Before installing a filter, applications must check
that the current version is compatible with the running kernel. Version
numbers are compatible if the major numbers match and the application minor
@ -367,15 +367,15 @@ struct bpf_insn {
The
.Li k
field is used in differnet ways by different insutructions,
field is used in different ways by different instructions,
and the
.Li jt
and
.Li jf
fields are used as offsets
by the branch intructions.
by the branch instructions.
The opcodes are encoded in a semi-hierarchical fashion.
There are eight classes of intructions:
There are eight classes of instructions:
.Dv BPF_LD ,
.Dv BPF_LDX ,
.Dv BPF_ST ,
@ -460,7 +460,7 @@ A <- M[k]
.It Dv BPF_LDX
These instructions load a value into the index register. Note that
the addressing modes are more retricted than those of the accumulator loads,
the addressing modes are more restrictive than those of the accumulator loads,
but they include
.Dv BPF_MSH ,
a hack for efficiently loading the IP header length.
@ -597,7 +597,7 @@ accept k bytes
.It Dv BPF_MISC
The miscellaneous category was created for anything that doesn't
fit into the above classes, and for any new instructions that might need to
be added. Currently, these are the register transfer intructions
be added. Currently, these are the register transfer instructions
that copy the index register to the accumulator or vice versa.
.Bl -tag -width "BPF_MISC+BPF_TAX" -compact

View file

@ -16,7 +16,7 @@ driver provides support for a
(Compact Disc-Read Only Memory) drive.
In an attempt to look like a regular disk, the
.Nm
driver synthesises a partition table, with one partition covering the entire
driver synthesizes a partition table, with one partition covering the entire
.Tn CD-ROM .
It is possible to modify this partition table using
.Xr disklabel 8 ,
@ -123,7 +123,7 @@ struct ioc_capability {
#define CDSETMUTE 0x00001000
/* Output can be muted */
#define CDSETPATCH 0x00008000
/* Direct routing countrol allowed */
/* Direct routing control allowed */
u_long special_function;
#define CDDOEJECT 0x00000001
@ -325,7 +325,7 @@ In addition the general
.Xr scsi 4
ioctls may be used with the
.Nm
driver, if used against the `whole disk' partiton (i.e.
driver, if used against the `whole disk' partition (i.e.
.Pa /dev/rcd0c ) .
.Sh NOTES
When a

View file

@ -15,7 +15,7 @@ driver provides support for a
juke box. It allows many slots of media to be multiplexed between a number
of drives.
.Pp
A scsi adapter must also be separatly configured into the system
A scsi adapter must also be separately configured into the system
before a scsi changer can be configured.
.Pp
As the scsi adapter is probed during boot, the

View file

@ -56,7 +56,7 @@ devices on the
.Tn SCSI
bus to particular units of the
.Nm
decice; refer to
device; refer to
.Xr scsi 4
for details on kernel configuration.
.Sh PARTITIONING
@ -111,11 +111,11 @@ disks as well as to other disks. They are defined in the header file
Usually used to set up a bad-block mapping system on the disk.
.Tn SCSI
drive incorporate their own bad-block mapping so this command is not
implimented.
implemented.
.It Dv DIOCGDINFO
Read, from the kernel, the in-core copy of the disklabel for the
drive. This may be a ficticious disklabel if the drive has never
been initialised, in which case it will contain information read
drive. This may be a fictitious disklabel if the drive has never
been initialized, in which case it will contain information read
from the
.Tn SCSI
inquiry commands.

View file

@ -69,7 +69,7 @@ Options in the kernel configuration file:
.Sh DESCRIPTION
Ipfirewall (later ipfw) is a system facility,which allows filtering
of incoming and/or forwarding packets on the protocol+source/destination
adress/ports base.
address/ports base.
Ipaccounting (later ipacct) is a system facility,which allows counting
of incoming,outgoing and forwarding traffic by packet/byte count.
@ -90,9 +90,9 @@ searching chain for matching entry the first matching is the best match,
[ or at least one of them :^) ].
That means:
* First in chain entries with specific protocol and small ranges
of src/dst adresses and ports.
* Later go entries with wider ranges of ports and adresses.
* Later entries matching every port for some adress range.
of src/dst addresses and ports.
* Later go entries with wider ranges of ports and addresses.
* Later entries matching every port for some address range.
* Later universal entries matching any protocol.
While deleting entry , every entry which equal to that passed to
@ -102,14 +102,14 @@ Flush removes all entries.
Every entry have several fields,by which packets matched:
struct ip_fw *next - next entry in chain.(Set internally)
struct in_addr src - source adress to be matched.
struct in_addr src_mask - source adress mask.
To match whole networks/subnets or adress groups
struct in_addr src - source address to be matched.
struct in_addr src_mask - source address mask.
To match whole networks/subnets or address groups
mask bits should be zeroed here and also
in src_mask field. Valuable bits should be set
in src_mask field.
struct in_addr dst - destination adress to be matched.
struct in_addr dst_mask - destination adress mask.
struct in_addr dst - destination address to be matched.
struct in_addr dst_mask - destination address mask.
u_short flags - flags field.See exact description of flags meaning
in description later.
@ -139,9 +139,9 @@ b) If entry protocol set to TCP/UDP/ICMP and packet protocol
different - no match,if packet protocol and entry protocol
same - continue.
c) If source addres pattern does not equal to packets sources adress
c) If source address pattern does not equal to packets sources address
masked with src_mask , or destination pattern not equal to packets
destination adress masked with dst_mask - no match.
destination address masked with dst_mask - no match.
If they does and protocol set to ALL/ICMP - got match.
If they does and protocol set to TCP/UDP - continue.
@ -152,7 +152,7 @@ In ipfw packet matched consequently against every chain entry.
Search continues untill first matching entry found.If IP_FW_F_ACCEPT
flag set - packet accepted.If it is not set - packet denied.
If no matching entry found , all unmatched packets ever accepted or
denied depending on global polici value. It can be set with
denied depending on global policy value. It can be set with
IP_FW_POLICY raw socket option. Deny value is 0, other values
(default 1) is accept.
@ -175,7 +175,7 @@ entries rised.p_cnt rises by 1 and b_cnt by ip_len value of ip packet.
Thus all traffic size counted including IP headers.
If IP_FW_F_BIDIR flag is set in accounting entry,packets counted are
those which match entry in standart way along with packets which match
those which match entry in standard way along with packets which match
entry while their source and destination addr/port pairs swapped.
Zero option allows all accounting to be cleared.
@ -198,9 +198,9 @@ been tracked,some less important ones expected.
This man page is mostly out of date and should be rewritten.
.Sh HISTORY
Ipfw facility has been intitially written as package to BSDI
Ipfw facility has been initially written as package to BSDI
by Daniel Boulet <danny@BouletFermat.ab.ca>.
It has been havily modified and ported to FreeBSD 2.0
It has been heavily modified and ported to FreeBSD 2.0
by Ugen J.S.Antsilevich <ugen@NetVision.net.il>
Ipacct facility written for FreeBSD 2.0
by Ugen J.S.Antsilevich <ugen@NetVision.net.il>

View file

@ -144,7 +144,7 @@ length structures, we have separated the selector lengths
from the data themselves.
The network address and various selectors are stored contiguously,
with the network address first, then the transport selector, and so
on. Thus, if you had a nework address of less then 20 bytes,
on. Thus, if you had a network address of less then 20 bytes,
the transport selector would encroach on space normally reserved
for the network address.
.Pp

View file

@ -23,7 +23,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: lkm.4,v 1.3 1995/04/05 01:06:00 jkh Exp $
.\" $Id: lkm.4,v 1.4 1996/01/17 21:07:38 wollman Exp $
.\"
.Dd January 17, 1996
.Dt LKM 4
@ -38,7 +38,7 @@ This ability also helps software developers to develop
new parts of the kernel without constantly rebooting to
test their changes.
.Pp
Various types of modules can be loaded into the sytem.
Various types of modules can be loaded into the system.
There are several defined module types, listed below, which can
be added to the system in a predefined way. In addition, there
is a generic type, for which the module itself handles loading and

View file

@ -40,7 +40,7 @@ adapter driver
.Xr ahc 4 ) .
A
.Tn SCSI
adapter must also be separatly configured into the system
adapter must also be separately configured into the system
before a
.Tn SCSI
tape can be configured.
@ -196,10 +196,10 @@ When reading a variable record/block from the tape, the head is
logically considered to be immediately after the last item read,
and before the next item after that. If the next item is a file mark,
but it was never read, then the next
process to read will immediately hit the file mark and receive an end-of-file nification.
process to read will immediately hit the file mark and receive an end-of-file notification.
.It Fixed block-size
Data written by the user is passed to the tape as a succession of
fixed size blocks. It may be contiguouse in memory, but it is
fixed size blocks. It may be contiguous in memory, but it is
considered to be a series of independent blocks. One may never write
an amount of data that is not an exact multiple of the blocksize. One
may read and write the same data as a different set of records, In
@ -224,23 +224,23 @@ understand why) that certain types of tape do not actually write two
file marks to tape, but when read, report a `phantom' file mark when the
last file is read. These devices include the QIC family of devices.
(It might be that this set of devices is the same set as that of fixed
block devices. This has not been detirmined yet, and they are treated
block devices. This has not been determined yet, and they are treated
as separate behaviors by the driver at this time.)
.Sh KERNEL CONFIGURATION
Because different tape drives behave differently, there is a mechanism
within the source to
.Nm
to quickly and conveniently recognise and deal
to quickly and conveniently recognize and deal
with brands and models of drive that have special requirements.
.Pp
There is a table (called the
.Dq Em Rogues Gallery )
in which the indentification
in which the identification
strings of known errant drives can be stored. Alongside each is
a set of flags that allows the setting of densities and blocksizes for each
of the four modes, along with a set of `QUIRK' flags that can be
used to enable or disable sections of code within the driver if a particular
drive is recognised.
drive is recognized.
.Sh IOCTLS
The following
.Xr ioctl 2

View file

@ -18,7 +18,7 @@
The
.Em scsi
system provides a uniform and modular system for the implementation
of drivers to control various scsi devices, and to utilise different
of drivers to control various scsi devices, and to utilize different
scsi host adapters through host adapter drivers. When the system probes the
.Em SCSI
busses, it attaches any devices it finds to the appropriate
@ -53,9 +53,9 @@ a config line similar to
.Em "controller scbus0 at ahc0"
which assigns scsi bus 0 to the first unit using the ahc driver.
For controllers supporting more than one bus,
the particualar bus can be specified as in
the particular bus can be specified as in
.Em "controller scbus3 at ahc1 bus 1"
which assigns scbus 1 to the second bus probled on the ahc1 device.
which assigns scbus 1 to the second bus probed on the ahc1 device.
.Pp
When you have a mixture of wired down and counted devices then the
counting begins with the first non-wired down unit for a particular
@ -97,7 +97,7 @@ be related to the device on which the ioctl was performed.
.It Dv SCIOCIDENTIFY
Ask the driver what it's bus, target and lun are.
.It Dv SCIOCDECONFIG
Ask the device to dissappear. This may not happen if the device is in use.
Ask the device to disappear. This may not happen if the device is in use.
.El
.Sh NOTES
the generic scsi part of the system is still being mapped out.
@ -119,7 +119,7 @@ many can transfer larger amounts.
Some adapters support
.Em Target mode
in which the system is capable of operating as a device, responding to
operations initioated by another system. Target mode will be supported for
operations initiated by another system. Target mode will be supported for
some adapters, but is not yet complete for this version of the scsi system.
.Sh FILES
see other scsi device entries.

View file

@ -56,7 +56,7 @@ devices on the
.Tn SCSI
bus to particular units of the
.Nm
decice; refer to
device; refer to
.Xr scsi 4
for details on kernel configuration.
.Sh PARTITIONING
@ -111,11 +111,11 @@ disks as well as to other disks. They are defined in the header file
Usually used to set up a bad-block mapping system on the disk.
.Tn SCSI
drive incorporate their own bad-block mapping so this command is not
implimented.
implemented.
.It Dv DIOCGDINFO
Read, from the kernel, the in-core copy of the disklabel for the
drive. This may be a ficticious disklabel if the drive has never
been initialised, in which case it will contain information read
drive. This may be a fictitious disklabel if the drive has never
been initialized, in which case it will contain information read
from the
.Tn SCSI
inquiry commands.

View file

@ -1,5 +1,5 @@
.\"
.\" $Id: snp.4,v 1.5 1995/02/27 19:45:57 ugen Exp $
.\" $Id: snp.4,v 1.6 1995/02/28 00:24:47 pst Exp $
.\" $Source: /home/ncvs/src/share/man/man4/snp.4,v $
.\"
.Dd February 24, 1995
@ -41,13 +41,13 @@ in a read buffer.
Special values defined are:
.Bl -tag -width SNP_TTYCLOSE
.It Dv SNP_OFLOW
device overflow occured, device detatched.
device overflow occured, device detached.
.It Dv SNP_TTYCLOSE
tty not attached.
.It Dv SNP_DETACH
.Nm snp
device has been detatched by user or tty device has been closed
and detatched.
device has been detached by user or tty device has been closed
and detached.
.Sh SEE ALSO
.Xr watch 8 ,
.Xr pty 4 ,

View file

@ -40,7 +40,7 @@ adapter driver
.Xr ahc 4 ) .
A
.Tn SCSI
adapter must also be separatly configured into the system
adapter must also be separately configured into the system
before a
.Tn SCSI
tape can be configured.
@ -196,10 +196,10 @@ When reading a variable record/block from the tape, the head is
logically considered to be immediately after the last item read,
and before the next item after that. If the next item is a file mark,
but it was never read, then the next
process to read will immediately hit the file mark and receive an end-of-file nification.
process to read will immediately hit the file mark and receive an end-of-file notification.
.It Fixed block-size
Data written by the user is passed to the tape as a succession of
fixed size blocks. It may be contiguouse in memory, but it is
fixed size blocks. It may be contiguous in memory, but it is
considered to be a series of independent blocks. One may never write
an amount of data that is not an exact multiple of the blocksize. One
may read and write the same data as a different set of records, In
@ -224,23 +224,23 @@ understand why) that certain types of tape do not actually write two
file marks to tape, but when read, report a `phantom' file mark when the
last file is read. These devices include the QIC family of devices.
(It might be that this set of devices is the same set as that of fixed
block devices. This has not been detirmined yet, and they are treated
block devices. This has not been determined yet, and they are treated
as separate behaviors by the driver at this time.)
.Sh KERNEL CONFIGURATION
Because different tape drives behave differently, there is a mechanism
within the source to
.Nm
to quickly and conveniently recognise and deal
to quickly and conveniently recognize and deal
with brands and models of drive that have special requirements.
.Pp
There is a table (called the
.Dq Em Rogues Gallery )
in which the indentification
in which the identification
strings of known errant drives can be stored. Alongside each is
a set of flags that allows the setting of densities and blocksizes for each
of the four modes, along with a set of `QUIRK' flags that can be
used to enable or disable sections of code within the driver if a particular
drive is recognised.
drive is recognized.
.Sh IOCTLS
The following
.Xr ioctl 2

View file

@ -14,7 +14,7 @@ process to address arbitrary locations on the scsi bus. Minor
numbers are mapped 1:1 to bus:target:lun. The lowest three bits being LUN
and the next three bits being TARGET. Remaining bits are the bus number.
.Pp
A scsi adapter must also be separatly configured into the system
A scsi adapter must also be separately configured into the system
before this driver makes sense.
.Pp
.Sh THE SU DEVICE IS NOT COMPLETED YET
@ -41,7 +41,7 @@ su{x}-{y}-{z} is the su device for the device at bus x, target y, lun z
.Sh DIAGNOSTICS
All
.Xr scsi 4
debug ioclts work on
debug ioctls work on
.Nm
devices.
.Sh SEE ALSO

View file

@ -359,7 +359,7 @@ Clear To Send.
.It TIOCM_CAR
Carrier Detect.
.It TIOCM_CD
Carier Detect (synonym).
Carrier Detect (synonym).
.It TIOCM_RNG
Ring Indication.
.It TIOCM_RI

View file

@ -52,7 +52,7 @@ uk{x} is the 'xth'unknown device found.
.Sh DIAGNOSTICS
All
.Xr scsi 4
debug ioclts work on
debug ioctls work on
.Nm
devices.
.Sh SEE ALSO

View file

@ -32,7 +32,7 @@
.\" USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
.\" DAMAGE.
.\"
.\" $Id: worm.4,v 1.1 1996/01/27 17:00:24 j Exp $
.\" $Id: worm.4,v 1.2 1996/01/27 17:55:54 joerg Exp $
.\"
.Dd January 27, 1996
.Dt WORM 4
@ -81,7 +81,7 @@ will be replaced by a loadable module scenario in the future.
.Pp
Due to the requirement of adjusting several parameters before actually
being able to write some data to the CD-R, and due to the tight timing
requirements when writing data, the driver distinguishs two different
requirements when writing data, the driver distinguishes two different
operation modes. When opening a file descriptor for a device belonging
to the
.Nm

View file

@ -26,7 +26,7 @@
.\" SUCH DAMAGE.
.\"
.\" from: @(#)yp.8 1.0 (deraadt) 4/26/93
.\" $Id: yp.4,v 1.3 1995/03/23 06:05:04 jkh Exp $
.\" $Id: yp.4,v 1.4 1995/09/02 04:20:01 wpaul Exp $
.\"
.Dd April 5, 1993
.Dt YP 4
@ -110,7 +110,7 @@ into
.Nm .dir
and
.Nm .pag
files which the ndbm code uses to hold seperate parts of the hash
files which the ndbm code uses to hold separate parts of the hash
database. The Berkeley DB hash method instead uses a single file for
both pieces of information. This means that while you may have
.Pa passwd.byname.dir
@ -162,7 +162,7 @@ on, the client system will direct all of its NIS requests to that server.
.Xr Ypbind 8
will occasionally ``ping'' the server to make sure it's still up
and running. If it fails to receive a reply to one of its pings
withing a reasonable amount of time,
within a reasonable amount of time,
.Xr ypbind 8
will mark the domain as unbound and begin broadcasting again in the
hopes of locating another server.
@ -202,7 +202,7 @@ key/data pair immediately following it (yp_first() and yp_next()
can be used to do a sequential search of an NIS map)
.It
.Nm yp_all()
-- retreive the entire contents of a map
-- retrieve the entire contents of a map
.El
.Pp
There are a few other requests which
@ -245,7 +245,7 @@ networks by:
.Bl -bullet -offset indent
.It
Providing backup services in the event that the NIS master crashes
or becomes unreachanble
or becomes unreachable
.It
Spreading the client load out over several machines instead of
causing the master to become overloaded
@ -269,9 +269,9 @@ other NIS implementations) when used exclusively with FreeBSD client
systems. The FreeBSD password database system (which is derived directly
form 4.4BSD) includes support for
.Nm shadow passwords .
The standard password database does not contain users' encrpyted
The standard password database does not contain users' encrypted
passwords: these are instead stored (along with other information)
is a seperate database which is accesible only by the super-user.
is a separate database which is accessible only by the super-user.
If the encrypted password database were made available as an NIS
map, this security feature would be totally disabled, since any user
is allowed to retrieve NIS data.
@ -370,7 +370,7 @@ upon bootup.
The
.Nm YP
subsystem was written from the ground up by Theo de Raadt
to be compatible to Sun's implimentation. Bug fixes, improvements
to be compatible to Sun's implementation. Bug fixes, improvements
and NIS server support were later added by Bill Paul. The server-side
code was originally written by Peter Eriksson and Tobias Reber and
is subject to the GNU Public License. No Sun code was

View file

@ -33,7 +33,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)a.out.5 8.1 (Berkeley) 6/5/93
.\" $Id$
.\" $Id: a.out.5,v 1.2 1994/12/23 22:41:45 nate Exp $
.\"
.Dd June 5, 1993
.Dt A.OUT 5
@ -126,7 +126,7 @@ flag and is preserved by
if necessary.
.El
.Pp
If both EX_DYNAMIC and EX_PIC are set, the object file is a position indendent
If both EX_DYNAMIC and EX_PIC are set, the object file is a position independent
executable image (eg. a shared library), which is to be loaded into the
process address space by the run-time link editor.
.Pp

View file

@ -51,7 +51,7 @@ entry.
It consists of records (directory entries) each of which contains
information about a file and a pointer to the file itself.
Directory entries may contain other directories
as well as plain files; such nested directories are refered to as
as well as plain files; such nested directories are referred to as
subdirectories.
A hierarchy of directories and files is formed in this manner
and is called a file system (or referred to as a file system tree).

View file

@ -28,7 +28,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id$
.\" $Id: ethers.5,v 1.1 1995/04/12 22:16:08 wpaul Exp $
.\"
.Dd April 12, 1995
.Dt ETHERS 5
@ -73,10 +73,10 @@ file.
.Pp
The
.Fn ether_line
function in the standarc C library can be used to break individual
function in the standard C library can be used to break individual
lines in the
.Pa /etc/ethers
database into their individial components: a binary ethernet address
database into their individual components: a binary Ethernet address
stored as an
.Pa ether_addr
structure, and a hostname stored as a character string.

View file

@ -26,7 +26,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: link.5,v 1.2 1995/04/16 12:35:13 ats Exp $
.\" $Id: link.5,v 1.3 1996/01/20 07:29:06 mpp Exp $
.\"
.Dd October 23, 1993
.Dt LINK 5
@ -52,7 +52,7 @@ to other objects that are required to complete the link-editing process and
indirection tables to facilitate
.Em Position Independent Code
(PIC for short) to improve sharing of code pages among different processes.
The collection of data structures described here will be refered to as the
The collection of data structures described here will be referred to as the
.Em Run-time Relocation Section (RRS)
and is embedded in the standard text and data segments of the dynamically
linked program or shared object image as the existing
@ -67,7 +67,7 @@ can be built by
The compiler also includes size information of any initialized data items
through the .size assembler directive. PIC code differs from conventional code
in that it accesses data variables through an indirection table, the
Global Offset Table, by convention accessable by the reserved name
Global Offset Table, by convention accessible by the reserved name
.Em _GLOBAL_OFFSET_TABLE_.
The exact mechanism used for this is machine dependent, usually a machine
register is reserved for the purpose. The rational behind this construct
@ -166,7 +166,7 @@ The start of a (linked) list of shared object descriptors needed by
.Em this
object.
.It Fa sdt_filler1
Depricated (used by SunOS to specify library search rules).
Deprecated (used by SunOS to specify library search rules).
.It Fa sdt_got
The location of the Global Offset Table within this image.
.It Fa sdt_plt
@ -203,7 +203,7 @@ The size of the Procedure Linkage Table.
.Pp
A
.Fa sod
structure descibes a shared object that is needed
structure describes a shared object that is needed
to complete the link edit process of the object containing it.
A list of such objects
.Po

View file

@ -204,16 +204,16 @@ file):
.Ed
Specific usernames are listed explicitly while netgroups are signfied
by a preceeding `@'. In the above example, users in the ``staff'' and
by a preceding `@'. In the above example, users in the ``staff'' and
``permitted-users'' netgroups will have their password information
read from NIS and used unaltered. In other worrds, they will be allowed
read from NIS and used unaltered. In other words, they will be allowed
normal access to the machine. Users ``ken'' and ``dennis,'' who have
beed named explicitly rather than through a netgroup, will also have
been named explicitly rather than through a netgroup, will also have
their password data read from NIS, _except_ that user ``ken'' will
have his shell remapped to
.Pa /bin/csh .
This means that value for his shell specified in the NIS password map
will be overriden by the value specified in the special NIS entry in
will be overridden by the value specified in the special NIS entry in
the local
.Pa master.passwd
file. User ``ken'' may have been assigned the csh shell because his
@ -235,7 +235,7 @@ who might otherwise be granted access because he happens to be a
member of an authorized netgroup. For example, if ``mitnick'' is
a member of the ``permitted-users'' netgroup and must, for whatever
the reason, be permitted to remain in that netgroup (possibly to
retain access to other machines within the domain), the admistrator
retain access to other machines within the domain), the administrator
can still deny him access to a particular system with a minus entry.
Also, it is sometimes easier to explicitly list those users who aren't
allowed access rather than generate a possibly complicated list of
@ -275,8 +275,8 @@ any of the other entries.
.Pa /usr/local/bin/go_away
can be a short shell script or program
that prints a message telling the user that he is not allowed access
to the system. This technique is sometimes userful when it is
desireable to have the system be able to recognize all users in a
to the system. This technique is sometimes useful when it is
desirable to have the system be able to recognize all users in a
particular NIS domain without necessarily granting them login access.
.Pp
The primary use of this
@ -306,7 +306,7 @@ into the NIS passwd maps totally defeats the security of FreeBSD's
password shadowing system.
.Pp
FreeBSD provides a few special features to help get around this
problem. It is possible to implement password shawdowing between
problem. It is possible to implement password shadowing between
FreeBSD NIS clients and FreeBSD NIS servers. The
.Xr getpwent 3
routines will search for a
@ -357,7 +357,7 @@ entry:
This entry will cause all users in the `foo-users' netgroup to
have
.Pa all
of their password information overriden, including UIDs,
of their password information overridden, including UIDs,
GIDs and passwords. The result is that all `foo-users' will be
locked out of the system, since their passwords will be remapped
to invalid values.
@ -368,7 +368,7 @@ using an NIS wildcard entry that looks like this:
+:*:0:0:::
.Ed
This often leads to new FreeBSD admins choosing NIS entries for their
This often leads to new FreeBSD administrators choosing NIS entries for their
.Pa master.passwd
files that look like this:
.Bd -literal -offset indent
@ -457,7 +457,7 @@ the password space.
.Pp
In %99 of all FreeBSD configurations, NIS client behavior will be
indistinguishable from that of SunOS or other similar systems. Even
so, users should be aware of these architctural differences.
so, users should be aware of these architectural differences.
.Pp
.Ss Using groups instead of netgroups for NIS overrides
FreeBSD offers the capability to do override matching based on
@ -545,7 +545,7 @@ Unless you're using FreeBSD's
.Xr ypserv 8 ,
which supports the use of
.Pa master.passwd
stype maps,
type maps,
the YP/NIS password database will be in old-style (Sixth Edition) format,
which means that site-wide values for user login class, password
expiration date, and other fields present in the current format

View file

@ -72,7 +72,7 @@ Access to the NIS
map can be enabled by adding a single ``+'' on a line by itself
in the
.Pa /etc/services
file. This causes the contenits of the NIS services map to be inserted
file. This causes the contents of the NIS services map to be inserted
at the location where the ``+'' appears.
.Sh FILES
.Bl -tag -width /etc/services -compact

View file

@ -4,11 +4,11 @@
.Os FreeBSD 1.2
.Sh NAME
.Nm skey.access
.Nd List of S/Key obligated host adresses
.Nd List of S/Key obligated host addresses
.Sh DESCRIPTION
The
.Nm skey.access
file contains a number of lines specifying host IP adresses
file contains a number of lines specifying host IP addresses
for which the use of S/Key passwords is obligated.
.Pp
The first word of each line says if UNIX passwords are

View file

@ -22,7 +22,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id$
.\" $Id: sysconfig.5,v 1.1 1995/12/19 13:35:31 jkh Exp $
.\"
.Dd December 18, 1995
.Dt SYSCONFIG 5
@ -174,7 +174,7 @@ where more precise time synchronization is required.
with or
.Ar NO
if you do not wish to initialize the time with ntpdate. This command is
intended to syncronize the system clock only \fBonce\fR from some standard
intended to synchronize the system clock only \fBonce\fR from some standard
server. An option to set this up initially (from a list of known servers)
is also provided by the \fB/stand/sysinstall\fR program when the system
is first installed.

View file

@ -1431,7 +1431,7 @@ The usual font for emphasis is italic.
.\" We are certain the reason most people desire a Harvard MBA
.\" so they can become to be successful philanthropists. Only
.\" mathematicians and physicists go to graduate school strictly
.\" to acquire infinite wealthy and fame. Its that inifinity
.\" to acquire infinite wealthy and fame. Its that infinity
.\" word that does it to them. Ruins them.
.\" .Ef
.Pp

View file

@ -26,7 +26,7 @@
.\" SUCH DAMAGE.
.\"
.\" from: @(#)yp.8 1.0 (deraadt) 4/26/93
.\" $Id: yp.4,v 1.3 1995/03/23 06:05:04 jkh Exp $
.\" $Id: yp.4,v 1.4 1995/09/02 04:20:01 wpaul Exp $
.\"
.Dd April 5, 1993
.Dt YP 4
@ -110,7 +110,7 @@ into
.Nm .dir
and
.Nm .pag
files which the ndbm code uses to hold seperate parts of the hash
files which the ndbm code uses to hold separate parts of the hash
database. The Berkeley DB hash method instead uses a single file for
both pieces of information. This means that while you may have
.Pa passwd.byname.dir
@ -162,7 +162,7 @@ on, the client system will direct all of its NIS requests to that server.
.Xr Ypbind 8
will occasionally ``ping'' the server to make sure it's still up
and running. If it fails to receive a reply to one of its pings
withing a reasonable amount of time,
within a reasonable amount of time,
.Xr ypbind 8
will mark the domain as unbound and begin broadcasting again in the
hopes of locating another server.
@ -202,7 +202,7 @@ key/data pair immediately following it (yp_first() and yp_next()
can be used to do a sequential search of an NIS map)
.It
.Nm yp_all()
-- retreive the entire contents of a map
-- retrieve the entire contents of a map
.El
.Pp
There are a few other requests which
@ -245,7 +245,7 @@ networks by:
.Bl -bullet -offset indent
.It
Providing backup services in the event that the NIS master crashes
or becomes unreachanble
or becomes unreachable
.It
Spreading the client load out over several machines instead of
causing the master to become overloaded
@ -269,9 +269,9 @@ other NIS implementations) when used exclusively with FreeBSD client
systems. The FreeBSD password database system (which is derived directly
form 4.4BSD) includes support for
.Nm shadow passwords .
The standard password database does not contain users' encrpyted
The standard password database does not contain users' encrypted
passwords: these are instead stored (along with other information)
is a seperate database which is accesible only by the super-user.
is a separate database which is accessible only by the super-user.
If the encrypted password database were made available as an NIS
map, this security feature would be totally disabled, since any user
is allowed to retrieve NIS data.
@ -370,7 +370,7 @@ upon bootup.
The
.Nm YP
subsystem was written from the ground up by Theo de Raadt
to be compatible to Sun's implimentation. Bug fixes, improvements
to be compatible to Sun's implementation. Bug fixes, improvements
and NIS server support were later added by Bill Paul. The server-side
code was originally written by Peter Eriksson and Tobias Reber and
is subject to the GNU Public License. No Sun code was

View file

@ -25,7 +25,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id$
.\" $Id: devfs_add_devsw.9,v 1.1 1995/12/31 00:08:17 joerg Exp $
.\"
.Dd December 31, 1995
.Os FreeBSD
@ -41,7 +41,7 @@
The call that adds an entry into devfs is
.Nm devfs_add_devsw .
.Pp
It's argumants are:
It's arguments are:
.Bl -tag -width 8X
.It Ar path
the path to the device within DEVFS

View file

@ -82,7 +82,7 @@ in
#endif /* DDB */
.Ed
And the name of the procedure shoule start with the prefix
And the name of the procedure should start with the prefix
.Li DDB_
to clearly identify the procedure as a debugger routine.
.El
@ -95,7 +95,7 @@ the opposite.
There are several reasons for this policy,
the main one is that the kernel is one monolithic name-space,
and polution is not a good idea here either.
and pollution is not a good idea here either.
For device drivers and other modules that don't add new internal interfaces
to the kernel, the entire source should be in one file it possible.

View file

@ -84,7 +84,7 @@ that take arguments are tagged automatically.
.It Fl f
Places the tag descriptions in a file called
.Ar tagsfile .
The default behaviour is to place them in a file called
The default behavior is to place them in a file called
.Ar tags .
.It Fl t
create tags for typedefs, structs, unions, and enums.

View file

@ -4,7 +4,7 @@
.\"
.\" nroff -man ee.1
.\"
.\" $Header: /users/hugh/tmp/old_ae/ee.1,v 1.16 1993/06/22 04:18:33 hugh Exp $
.\" $Header: /home/ncvs/src/usr.bin/ee/ee.1,v 1.1.1.1 1995/08/30 07:28:06 jkh Exp $
.\"
.\"
.TH ee 1 "" "" "" ""
@ -143,7 +143,7 @@ menu, or via the initialization file (see below). The mappings are as follows:
^t Move to the top of the text.
^u Move to the bottom of the text.
^v Move to the next page.
^w Delete the word begining at the cursor position.
^w Delete the word beginning at the cursor position.
^y Prompt for the string to search for.
^z Next word.
^[ (ESC) Pop up menu.

View file

@ -1,5 +1,5 @@
.TH FILE 1 "Copyright but distributable"
.\# $Id: file.1,v 1.2 1994/09/03 19:31:15 csgr Exp $
.\# $Id: file.1,v 1.3 1996/01/23 12:40:09 mpp Exp $
.SH NAME
file
\- determine file type
@ -144,7 +144,7 @@ can be used to set the default magic number files.
This program is believed to exceed the System V Interface Definition
of FILE(CMD), as near as one can determine from the vague language
contained therein.
Its behaviour is mostly compatible with the System V program of the same name.
Its behavior is mostly compatible with the System V program of the same name.
This version knows more magic, however, so it will produce
different (albeit more accurate) output in many cases.
.PP
@ -323,7 +323,7 @@ The list of keywords in
probably belongs in the Magic file.
This could be done by using some keyword like `*' for the offset value.
.PP
Another optimisation would be to sort
Another optimization would be to sort
the magic file so that we can just run down all the
tests for the first byte, first word, first long, etc, once we
have fetched it. Complain about conflicts in the magic file entries.

View file

@ -185,7 +185,7 @@ current remote machine working directory.
Change the permission modes of the file
.Ar file-name
on the remote
sytem to
system to
.Ar mode .
.It Ic close
Terminate the

View file

@ -86,7 +86,7 @@ Whatever
.Xr getopt 3
has.
.Pp
Arguments containing white space or imbedded shell metacharacters
Arguments containing white space or embedded shell metacharacters
generally will not survive intact; this looks easy to fix but isn't.
.Pp
The error message for an invalid option is identified as coming

View file

@ -37,12 +37,12 @@ machine to generate the first one time password. Without the \-s the
system will assume you are direct connected over secure communications
and prompt you for your secret password.
The \-s option also allows one to set the seed and count for complete
control of the parameters. You can use keyinit -s in compination with
control of the parameters. You can use keyinit -s in combination with
the
.I key
command to set the seed and count if you do not like the defaults.
To do this run keyinit in one window and put in your count and seed
then run key in another window to generate the correct 6 english words
then run key in another window to generate the correct 6 English words
for that count and seed. You can then
"cut" and "paste" them or copy them into the keyinit window.
.sp

View file

@ -22,7 +22,7 @@
.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
.\" POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id$
.\" $Id: killall.1,v 1.1.1.1 1995/06/25 18:08:27 joerg Exp $
.\"
.Dd June 25, 1995
.Os FreeBSD 2.2
@ -99,7 +99,7 @@ The
command will respond with a short usage message and exit with a status
of 2 in case of a command error. A status of 1 will be returned if
either no matching process has been found or not all processes have
been signalled succesfully. Otherwise, a status of 0 will be
been signalled successfully. Otherwise, a status of 0 will be
returned.
.Pp
Diagnostic messages will only be printed if requested by

View file

@ -83,7 +83,7 @@ If the file
.Pa /etc/nologin
exists,
.Nm login
dislays its contents to the user and exits.
displays its contents to the user and exits.
This is used by
.Xr shutdown 8
to prevent users from logging in when the system is about to go down.

View file

@ -1,4 +1,4 @@
.\" $Id: lsvfs.1,v 1.1 1994/09/22 01:25:56 wollman Exp $
.\" $Id: lsvfs.1,v 1.2 1995/03/16 18:37:46 wollman Exp $
.\" Garrett A. Wollman, September 1994
.\" This file is in the public domain.
.\"
@ -50,6 +50,6 @@ is currently defined).
.Sh HISTORY
A
.Nm
comand appeared in
command appeared in
.Tn FreeBSD
2.0.

View file

@ -232,7 +232,7 @@ Unexamined messages go back to the post office.
.Fl f
option above).
.Pp
.Ss Personal and systemwide distribution lists.
.Ss Personal and system wide distribution lists.
It is also possible to create a personal distribution lists so that,
for instance, you can send mail to
.Dq Li cohorts

View file

@ -128,7 +128,7 @@ appeared in
.Sh BUGS
.Nm mkstr
was intended for the limited architecture of the PDP 11 family.
Very few programs actually use it. The pascal interpreter,
Very few programs actually use it. The Pascal interpreter,
.Xr \&pi 1
and the editor,
.Xr \&ex 1

View file

@ -31,7 +31,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: rup.1,v 1.1.1.1 1994/08/28 15:01:31 csgr Exp $
.\" $Id: rup.1,v 1.2 1994/11/18 21:37:40 ats Exp $
.\"
.Dd June 7, 1993
.Dt RUP 1
@ -79,7 +79,7 @@ daemon has terminated on the remote host.
.It rup: RPC: Port mapper failure - RPC: Timed out
The remote host is not running the portmapper (see
.Xr portmap 8 ),
and cannot accomodate any RPC-based services. The host may be down.
and cannot accommodate any RPC-based services. The host may be down.
.El
.Sh SEE ALSO
.Xr portmap 8 ,

View file

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" from: @(#)rusers.1 6.7 (Berkeley) 4/23/91
.\" $Id: rusers.1,v 1.1 1993/09/16 01:15:47 jtc Exp $
.\" $Id: rusers.1,v 1.1.1.1 1994/08/28 15:06:02 csgr Exp $
.\"
.Dd April 23, 1991
.Dt RUSERS 1
@ -77,7 +77,7 @@ daemon has terminated on the remote host.
.It rusers: RPC: Port mapper failure - RPC: Timed out
The remote host is not running the portmapper (see
.Xr portmap 8 ),
and cannot accomodate any RPC-based services. The host may be down.
and cannot accommodate any RPC-based services. The host may be down.
.El
.Sh SEE ALSO
.Xr portmap 8 ,

View file

@ -28,7 +28,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id:$
.\" $Id: sasc.1,v 1.2 1995/09/08 18:42:44 julian Exp $
.\"
.TH SASC 1 "January 6, 1995" FreeBSD "FreeBSD Reference Manual"
.SH NAME
@ -47,7 +47,7 @@
The \fBsasc\fP utility provides shell level access to the ioctl
requests served by the handy scanner device driver asc. Please see
asc(4) for the exact meaning of the requests. Generally they modify
the output and behaviour of the asc scanner device. When \fBsasc\fP is
the output and behavior of the asc scanner device. When \fBsasc\fP is
called with no option only the current settings are reported.
.SH OPTIONS
.TP 3
@ -55,7 +55,7 @@ called with no option only the current settings are reported.
Set the scanner with the values of the resolution selector switch.
.TP
\fB-q\fP
Operate in quiet mode, i.e. do not report any of the current setings.
Operate in quiet mode, i.e. do not report any of the current settings.
Normally the parameters are shown after the modifications have been
performed.
.TP

View file

@ -99,8 +99,8 @@ containing a particular section can change when a document
is modified, this provides a convenient hook by which separate
documents can provide links into another document without the
links becoming invalid when the target document is modified.
When creating a symbolic link, any occurence of a slash (/) in label
is replaced with percent (%), while any occurence of a space is replaced
When creating a symbolic link, any occurrence of a slash (/) in label
is replaced with percent (%), while any occurrence of a space is replaced
with an underscore (_).
.It Fl ssi
When used with the
@ -165,7 +165,7 @@ confuse
.Xr groff 1
which is used to generate ASCII output.
.Pp
The divison of the sources file into separate HTML files is
The division of the sources file into separate HTML files is
currently fixed.
.Pp
Although legal according to the DTD, it the ascii formatting gets botched if

View file

@ -175,6 +175,6 @@ that generated the warning.
.SH BUGS
More warning messages could be generated.
.I tconv
can't translate to termcap. Binaries generated will have cancelled
capabilities marked as cancelled, which is incompatible with
can't translate to termcap. Binaries generated will have canceled
capabilities marked as canceled, which is incompatible with
System V Release 2.0 terminfo.

View file

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" From: @(#)install.1 8.1 (Berkeley) 6/6/93
.\" $Id$
.\" $Id: install.1,v 1.2 1995/10/09 07:20:59 bde Exp $
.\"
.Dd October 9, 1995
.Dt INSTALL 1
@ -71,7 +71,7 @@ allow.
.It Fl C .
Copy the file, as if the
.Fl c
option is specifed,
option is specified,
except if the target file already exists and the files are the same,
then don't change the modification time of the target
.It Fl c
@ -110,7 +110,7 @@ Specify an owner.
Preserve the modification time.
Copy the file, as if the
.Fl C
(Compare and copy) option is specifed,
(Compare and copy) option is specified,
except if the target file doesn't already exist or is different,
then preserve the modification time of the file.
.It Fl s

View file

@ -13,7 +13,7 @@
.\" must display the following acknowledgement:
.\" This product includes software developed by Winning Strategies, Inc.
.\" 4. The name of the author may not be used to endorse or promote products
.\" derived from this software withough specific prior written permission
.\" derived from this software without specific prior written permission
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
@ -26,7 +26,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: ypcat.1,v 1.1 1994/01/11 19:01:27 nate Exp $
.\" $Id: ypcat.1,v 1.1 1994/08/08 01:13:29 wollman Exp $
.\"
.Dd December 3, 1993
.Dt YPCAT 1

View file

@ -13,7 +13,7 @@
.\" must display the following acknowledgement:
.\" This product includes software developed by Winning Strategies, Inc.
.\" 4. The name of the author may not be used to endorse or promote products
.\" derived from this software withough specific prior written permission
.\" derived from this software without specific prior written permission
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
@ -26,7 +26,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: ypmatch.1,v 1.1 1994/01/11 19:01:30 nate Exp $
.\" $Id: ypmatch.1,v 1.1 1994/08/08 01:13:32 wollman Exp $
.\"
.Dd December 3, 1993
.Dt YPMATCH 1

View file

@ -28,7 +28,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: ac.8,v 1.3 1995/10/07 12:02:33 joerg Exp $
.\" $Id: ac.8,v 1.4 1996/01/20 07:28:13 mpp Exp $
.\"
.Dd March 15, 1994
.Dt AC 8
@ -141,7 +141,7 @@ rotated files
.\" of a user being logged in when the
.\" .Pa wtmp
.\" file was rotated, in which case a login with ut_host of ":0.0" may
.\" appear without any preceeding console logins.
.\" appear without any preceding console logins.
.\" If no one is logged in on the console, the user is deemed to have
.\" logged in on at the earliest time stamp found in
.\" .Pa wtmp .
@ -149,7 +149,7 @@ rotated files
.\" .Pa console
.\" allows
.\" .Nm ac
.\" to identify and correcty process a logout for the user. The default
.\" to identify and correctly process a logout for the user. The default
.\" value for
.\" .Pa console
.\" is usually correct at compile time.

View file

@ -28,10 +28,10 @@
.\"
.\" /usr/sbin/adduser - add new user(s)
.\"
.\" Bugs: sure (my english!)
.\" Bugs: sure (my English!)
.\" Email: Wolfram Schneider <wosch@cs.tu-berlin.de>
.\"
.\" $Id: adduser.8,v 1.5 1995/03/07 16:42:33 w Exp w $
.\" $Id: adduser.8,v 1.7 1995/03/08 22:44:35 ache Exp $
.\"
.Dd Jan, 9, 1995
@ -67,9 +67,9 @@ not allowed.
.It Sy shell
Only valid shells from shell database or sliplogin and pppd
.It Sy uid
Automatic generated or your choise. Less than 32000.
Automatically generated or your choice. Less than 32000.
.It Sy gid/login group
Your choise or automatic generated.
Your choice or automatically generated.
.It Sy password
If not empty password is encoded with crypt.
.El
@ -80,11 +80,11 @@ with most other schemes. With each user in his/her own group the user can
safely run with a umask of 002 and have files created in there home directory
and not worry about others being able to read them.
For a shared area you create a seperate uid/gid (like cvs or ncvs on freefall),
For a shared area you create a separate uid/gid (like cvs or ncvs on freefall),
you place each person that should be able to access this area into that new
group.
This model of uid/gid administration allows far greater flexibilty that lumping
This model of uid/gid administration allows far greater flexibility that lumping
users into groups and having to muck with the umask when working in a shared
area.
@ -153,7 +153,7 @@ Do not read config file.
Default shell for new users.
.It Sy -silent,-s,-quit,-q
Few warnings, question, bugreports.
Few warnings, question, bug reports.
.It Sy -uid Ar uid
Use uid's from
@ -161,7 +161,7 @@ Use uid's from
up.
.It Sy -verbose,-v
Many warning, question. Recommended for noivice users.
Many warning, question. Recommended for novice users.

View file

@ -55,7 +55,7 @@ in minutes,
.Nm start_s,
in seconds and
.Nm start_f
(frame number) to the abolute address defined by
(frame number) to the absolute address defined by
.Nm end_m
in minutes,
.Nm end_s,

View file

@ -57,7 +57,7 @@ in minutes,
.Nm start_s,
in seconds and
.Nm start_f
(frame number) to the abolute address defined by
(frame number) to the absolute address defined by
.Nm end_m
in minutes,
.Nm end_s,

View file

@ -39,8 +39,8 @@
.Ar device
.Sh DESCRIPTION
.Nm Fdcontrol
allows the modification of the run-time behaviour of the floppy
disk device specifed by
allows the modification of the run-time behavior of the floppy
disk device specified by
.Ar device .
.Ar Device
should be a character device.

View file

@ -69,7 +69,7 @@ are meaningless, since they're overridden by
The options are as follows:
.Bl -tag -width 10n -offset indent
.It Fl q
supress any normal output from the command, and don't ask the
suppress any normal output from the command, and don't ask the
user for a confirmation whether to format the floppy disk at
.Ar device_name .
.It Fl f Ar capacity

View file

@ -6,7 +6,7 @@
.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
.\" ----------------------------------------------------------------------------
.\"
.\" $Id$
.\" $Id: fdwrite.1,v 1.1.1.1 1994/09/18 07:39:19 phk Exp $
.\"
.\"
.Dd September 16, 1993
@ -29,7 +29,7 @@ Any floppy disk device capable of formatting can be used.
will ask the user
.Pq on /dev/tty
to insert a new floppy and press return.
The device will then be opened, and queried for it's paramters,
The device will then be opened, and queried for it's parameters,
then each track will be formatted, written with data from the
.Ar inputfile ,
read back and compared.

View file

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" from: @(#)inetd.8 8.3 (Berkeley) 4/13/94
.\" $Id: inetd.8,v 1.5 1995/10/09 23:34:07 davidg Exp $
.\" $Id: inetd.8,v 1.6 1995/10/12 16:43:25 wollman Exp $
.\"
.Dd April 13, 1994
.Dt INETD 8
@ -443,7 +443,7 @@ command appeared in
TCPMUX is based on code and documentation by Mark Lottor.
Support for
.Tn "ONC RPC"
based services is modelled after that
based services is modeled after that
provided by
.Tn SunOS
4.1.

View file

@ -34,7 +34,7 @@
.\"
.\" E-Mail: Wolfram Schneider <wosch@cs.tu-berlin.de>
.\"
.\" $Id: kbdmap.1,v 1.5 1995/04/01 17:07:26 w Exp $
.\" $Id: kbdmap.1,v 1.1 1995/04/05 08:09:22 jkh Exp $
.\"
.Dd Mar 25, 1995
@ -56,7 +56,7 @@
.Sh DESCRIPTION
.Nm kbdmap
allow easy setting of avaible keymaps.
allow easy setting of available keymaps.
.Nm vidfont
do it for fonts.
Both looking in a database for a description. Description is
@ -85,7 +85,7 @@ Load default font from /etc/sysconfig
.It Fl v , Fl verbose
More warnings.
.Sh ENVIROMENT
.Sh ENVIRONMENT
.Bl -tag -width /etc/master.passwdxx -compact
.Pa LANG
Prefered language.
@ -109,7 +109,7 @@ Describe common LANG values.
.Sh BUGS
.\" .Nm kbdmap/vidfont
.\" does not know which font is in use. E.g. if the current font
.\" is iso-8859-1 and you choise lang 'ru' (for russian)
.\" is iso-8859-1 and you chose lang 'ru' (for Russian)
.\" you get funny latin1 characters and not russkij shrift.
.\"
.Nm vidcontrol

View file

@ -1,4 +1,4 @@
.\" $Id: lsdev.8,v 1.2 1994/10/23 21:33:55 wollman Exp $
.\" $Id: lsdev.8,v 1.3 1994/12/12 00:35:01 ats Exp $
.\" Garrett A. Wollman, October 1994
.\" This file is in the public domain.
.\"
@ -56,10 +56,10 @@ supported device type names
.\" .Xr chdev 8
.Xr sysctl 3
.Sh BUGS
Not all devices have the proper support implmented yet.
Not all devices have the proper support implemented yet.
.Sh HISTORY
An
.Nm
comand appeared in
command appeared in
.Tn FreeBSD
2.0.

View file

@ -1,7 +1,7 @@
.\"
.\" (c) Wolfram Schneider, Berlin, Germany. Public domain.
.\"
.\" $Id: manctl.8,v 1.1 1996/01/23 20:51:29 wosch Exp $
.\" $Id: manctl.8,v 1.1 1996/01/23 23:59:35 wosch Exp $
.Dd Jan 1996
.Dt manctl 8
@ -30,7 +30,7 @@ If possible, .so's are replaced with hard links.
.It Fl help
Print options and exit.
.It Fl compress
Compress uncompressed man pages (elliminating .so's)
Compress uncompressed man pages (eliminating .so's)
.It Fl uncompress
Uncompress compressed man pages.
.It Fl purge

View file

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" From: @(#)mtree.8 8.2 (Berkeley) 12/11/93
.\" $Id$
.\" $Id: mtree.8,v 1.5 1995/02/10 03:12:30 wollman Exp $
.\"
.Dd February 9, 1995
.Dt MTREE 8
@ -259,7 +259,7 @@ and
options can be used in combination to create directory hierarchies
for distributions and other such things; the files in
.Pa /etc/mtree
were used to create almost all diectories in this
were used to create almost all directories in this
.Tn FreeBSD
distribution.
.Sh FILES

View file

@ -22,7 +22,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: ncrcontrol.8,v 1.1 1994/10/13 17:43:51 se Exp $
.\" $Id: ncrcontrol.8,v 1.2 1994/12/02 06:19:37 nate Exp $
.\"
.Dd September 16, 1994
.Dt NCRCONTROL 8
@ -194,7 +194,7 @@ interval argument, it displays a running count of statistics related to
the transfers on the selected scsi bus.
This display consists of the number of transfers and number of transferred
byted for the controller and for each connected target.
bytes for the controller and for each connected target.
(NOT YET COMPLETE)

View file

@ -6,7 +6,7 @@
.TP
.B pkg_manage
.SH DESCRIPTION
Pkg_manage is an interactive tool with wich you can install,
Pkg_manage is an interactive tool with which you can install,
delete and view packages. It is a
front-end to the pkg_add(1), pkg_info(1) and pkg_delete(1) programs.
@ -74,7 +74,7 @@ to continue,
.B <Cancel>
to back out.
Once a directory has been chosen, it will be scanned for packages files,
tpically files ending in '.tgz'. These will be listed in
typically files ending in '.tgz'. These will be listed in
a listbox (the one on the left) as well as the already installed
packages, that will be listed in a similar box (on the right side).
Use TAB or SHIFT-TAB to move from field to field.

View file

@ -1,5 +1,5 @@
.\" manual page [] for ppp 0.94 beta2 + alpha
.\" $Id: ppp.8,v 1.11 1995/09/24 18:15:14 nate Exp $
.\" $Id: ppp.8,v 1.12 1995/10/08 14:57:31 amurai Exp $
.Dd 20 September 1995
.Os FreeBSD
.Dt PPP 8
@ -321,9 +321,9 @@ When an outgoing packet is detected,
will perform the dialing action (chat script) and try to connect
with the peer.
If the connect fails, the default behaviour is to wait 30 seconds
If the connect fails, the default behavior is to wait 30 seconds
and then attempt to connect when another outgoing packet is detected.
This behaviour can be changed with
This behavior can be changed with
.Bd -literal -offset indent
set redial seconds|random [dial_attempts]
.Ed
@ -702,7 +702,7 @@ will always try to consult the user's personal setup first.
.Bl -tag -width flag
.It $HOME/ppp/.ppp.[conf|linkup|secret]
User dependant configuration files.
User dependent configuration files.
.It /etc/ppp/ppp.conf
System default configuration file.

View file

@ -1,5 +1,5 @@
.\" manual page [] for ppp 0.94 beta2 + alpha
.\" $Id: ppp.8,v 1.11 1995/09/24 18:15:14 nate Exp $
.\" $Id: ppp.8,v 1.12 1995/10/08 14:57:31 amurai Exp $
.Dd 20 September 1995
.Os FreeBSD
.Dt PPP 8
@ -321,9 +321,9 @@ When an outgoing packet is detected,
will perform the dialing action (chat script) and try to connect
with the peer.
If the connect fails, the default behaviour is to wait 30 seconds
If the connect fails, the default behavior is to wait 30 seconds
and then attempt to connect when another outgoing packet is detected.
This behaviour can be changed with
This behavior can be changed with
.Bd -literal -offset indent
set redial seconds|random [dial_attempts]
.Ed
@ -702,7 +702,7 @@ will always try to consult the user's personal setup first.
.Bl -tag -width flag
.It $HOME/ppp/.ppp.[conf|linkup|secret]
User dependant configuration files.
User dependent configuration files.
.It /etc/ppp/ppp.conf
System default configuration file.

View file

@ -27,7 +27,7 @@
.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: quot.8,v 1.1.1.2 1995/11/03 15:06:02 peter Exp $
.\" $Id: quot.8,v 1.2 1995/11/03 15:21:02 peter Exp $
.\"
.Dd February 8, 1994
.Dt QUOT 8
@ -55,7 +55,7 @@ blocks in files with this or lower size.
For each user, display count of files and space occupied.
.It Fl h
Estimate the number of blocks in each file based on its size.
Despite that this doesn't give the correct resuls (it doesn't
Despite that this doesn't give the correct results (it doesn't
account for the holes in files), this option isn't any faster
and thus is discouraged.
.It Fl k

View file

@ -1,4 +1,4 @@
.\" @(#) $Header: /a/ncvs/src/usr.sbin/rarpd/rarpd.8,v 1.1.1.1 1995/03/02 06:41:40 wpaul Exp $ (LBL)
.\" @(#) $Header: /home/ncvs/src/usr.sbin/rarpd/rarpd.8,v 1.2 1995/03/05 22:04:05 wpaul Exp $ (LBL)
.\"
.\" Copyright (c) 1988-1990 The Regents of the University of California.
.\" All rights reserved.
@ -46,7 +46,7 @@ must be present in both the
and
.I hosts(5)
databases.
If a host does not exist in both databses, the translation cannot
If a host does not exist in both databases, the translation cannot
proceed and a reply will not be sent.
Additionally, a request is honored only if the server

View file

@ -28,7 +28,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: rtprio.1,v 1.1 1994/09/01 12:05:13 davidg Exp $
.\" $Id: rtprio.1,v 1.3 1994/10/02 04:48:19 davidg Exp $
.\"
.Dd July 23, 1994
.Dt RTPRIO 1
@ -188,7 +188,7 @@ the process may be stopped for pagein. (See mprotect(2), madvise(2)).
Under
FreeBSD
system calls are currently never preempted, therefore non-realtime
processes can starve realtime procesess, or idletime processes can
processes can starve realtime processes, or idletime processes can
starve normal priority processes.
Others ...

View file

@ -1,4 +1,4 @@
.\" $Id$
.\" $Id: sicontrol.8,v 1.2 1995/09/26 18:18:49 peter Exp $
.\" The following requests are required for all man pages.
.Dd September 26,1995
.Dt SICONTROL 8
@ -47,7 +47,7 @@ The default value of 4 at boot time allows an interrupt rate of
approximately 25.
.Pp
Lowering this value will increase the rate in which the host adapter can
interrupt the operating system to empty the receviver fifos.
interrupt the operating system to empty the receiver fifos.
.\"
.It Cm nport
Returns the number of ports under the control of the device driver.

View file

@ -175,7 +175,7 @@ for two interfaces with same number.
By default sliplogin dynamically assigns the unit number.
.El
.Pp
If latter two parameters are ommitted, they will not affect the
If latter two parameters are omitted, they will not affect the
corresponding SLIP configuration.
If any of first two parameters is equal to zero, it will not affect
the corresponding SLIP configuration.

View file

@ -60,7 +60,7 @@ is specified, the default is 5 seconds.
Verbose display of extra fields of information.
.TP
\-r
Display all values in rate per second that ammount per interval.
Display all values in rate per second that amount per interval.
.TP
unit
is a single digit specifying the slip interface. The default unit is
@ -111,7 +111,7 @@ search
searches for connection state
.TP
miss
times we could not find a connectoin state
times we could not find a connection state
.TP
coll
collisions with end of clists.

View file

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" From: @(#)sysctl.8 8.1 (Berkeley) 6/6/93
.\" $Id: sysctl.8,v 1.6 1995/02/20 19:42:42 guido Exp $
.\" $Id: sysctl.8,v 1.7 1995/12/21 12:39:24 phk Exp $
.\"
.Dd September 23, 1994
.Dt SYSCTL 8
@ -113,7 +113,7 @@ purpose programs such as
and
.Nm netstat .
.Pp
The string and integer information is summaried below.
The string and integer information is summarized below.
For a detailed description of these variable see
.Xr sysctl 3 .
.Pp
@ -235,7 +235,7 @@ definitions for fourth level UDP identifiers
.Sh BUGS
.Nm sysctl
presently exploits an undocumented interface to the kernel
sysctl facility to traverse the sysctl tree and to retrive format
sysctl facility to traverse the sysctl tree and to retrieve format
and name information.
This correct interface is being thought about for the time being.
.Sh HISTORY

View file

@ -65,7 +65,7 @@ Set border color to
(only supported on VGA hardware):
.TP
.BI "\-c\ " normal | blink | destructive
Change the cursor apperance. The cursor is either an inverting block
Change the cursor appearance. The cursor is either an inverting block
(normal) that eventually can "blink". Or it can be like the old hardware cursor
(destructive). The latter is actually a simulation.
.TP

View file

@ -7,7 +7,7 @@
.Sh NAME
.Nm watch
.Nd snoop on another tty line
.Sh SYNOPSYS
.Sh SYNOPSIS
.Nm watch
.Op Fl ciotW
.Ar tty
@ -37,7 +37,7 @@ If output is redirected to a file, interactive mode can still be requested
by specifying this option.
.It Fl o
Reconnect on overflow.
The behaviour of
The behavior of
.Nm watch
if the observed tty overflows is similar to the behavior if the observed tty
is closed.

View file

@ -29,7 +29,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: yppush.8,v 1.2 1996/01/12 06:21:52 wpaul Exp wpaul $
.\" $Id: yppush.8,v 1.1.1.1 1996/01/12 07:03:33 wpaul Exp $
.\"
.Dd February 5, 1995
.Dt YPPUSH 8
@ -164,9 +164,9 @@ a particular NIS domain.
.Xr ypxfr 8 ,
.Xr yp 8
.Sh BUGS
The mechanism for transfering NIS maps in NIS v1 is different
The mechanism for transferring NIS maps in NIS v1 is different
that that in NIS version 2. This version of
.Nm yppush
has support for transfering maps to NIS v2 systems only.
has support for transferring maps to NIS v2 systems only.
.Sh AUTHOR
Bill Paul <wpaul@ctr.columbia.edu>

View file

@ -28,7 +28,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: ypserv.8,v 1.4 1995/12/10 04:46:38 wpaul Exp $
.\" $Id: ypserv.8,v 1.1.1.1 1995/12/16 20:54:17 wpaul Exp $
.\"
.Dd February 4, 1995
.Dt YPSERV 8
@ -68,7 +68,7 @@ using the
command. The clients must also run
.Xr ypbind 8
in order to attach to a particular server, since it is possible to
have serveral servers within a single NIS domain.
have several servers within a single NIS domain.
.Pp
The databases distributed by
.Nm ypserv
@ -114,7 +114,7 @@ To make up for this, the FreeBSD version of
handles the
.Pa master.passwd.byname
and
.Pa master.basswd.byuid
.Pa master.passwd.byuid
maps in a special way. When the server receives a request to access
either of these two maps, it will check the TCP port from which the
request originated and return an error if the port number is greater
@ -125,7 +125,7 @@ Any requests made by non-privileged users are therefore rejected.
.Pp
Furthermore, the
.Xr getpwent 3
routines in FreeBSD's standard C libarary will only attempt to retrieve
routines in FreeBSD's standard C library will only attempt to retrieve
data from the
.Pa master.passwd.byname
and
@ -167,7 +167,7 @@ This will cause the standard
and
.Pa passwd.byuid
maps to be generated with valid encrypted password fields, which is
neccesary in order for non-FreeBSD clients to perform user
necessary in order for non-FreeBSD clients to perform user
authentication through NIS.
.El
.Pp
@ -187,7 +187,7 @@ you can easily recompile
with them, thereby enabling its 'securenets' features: you can
configure
.Nm ypserv
to only handle resquests from machines listed
to only handle requests from machines listed
in the
.Pa tcpwrapper
configuration files, which would help limit vulnerability to the
@ -236,7 +236,7 @@ will construct a fake database record and return it to the client,
thereby making it seem as though the client's yp_match request
succeeded.
.Pp
This feature is provided for compatiblity with SunOS 4.1.x,
This feature is provided for compatibility with SunOS 4.1.x,
which has brain-damaged resolver functions in its standard C
library that depend on NIS for hostname and address resolution.
FreeBSD's resolver can be configured to do DNS
@ -250,7 +250,7 @@ using the
.Xr syslog 3
facility. In debug mode, the server does not background
itself and prints extra status messages to stderr for each
request that it revceives. Also, while running in debug mode,
request that it receives. Also, while running in debug mode,
.Nm ypserv
will not spawn any additional subprocesses as it normally does
when handling yp_all requests or doing DNS lookups. (These actions