From 157b21473395da677b276b72b682a809bc162687 Mon Sep 17 00:00:00 2001 From: Jason Leschnik Date: Mon, 24 Oct 2016 20:20:41 +1100 Subject: [PATCH] fix minor typos in Secure-Programs-HOWTO.sgml --- .../Secure-Programs-HOWTO.sgml | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/LDP/howto/docbook/Secure-Programs-HOWTO/Secure-Programs-HOWTO.sgml b/LDP/howto/docbook/Secure-Programs-HOWTO/Secure-Programs-HOWTO.sgml index cbf304b9..1d4355ee 100644 --- a/LDP/howto/docbook/Secure-Programs-HOWTO/Secure-Programs-HOWTO.sgml +++ b/LDP/howto/docbook/Secure-Programs-HOWTO/Secure-Programs-HOWTO.sgml @@ -3528,7 +3528,7 @@ into many virtual machines (in a sense, a ``super-chroot''); its most popular use has been to provide virtual machine services for Internet Service Provider environments. Inside a jail, all processes (even those owned by root) -have the the scope of their requests limited to the jail. +have the scope of their requests limited to the jail. When a FreeBSD system is booted up after a fresh install, no processes will be in jail. When a process is placed in a jail, it, and any descendants of @@ -4256,7 +4256,7 @@ for more information about this. -When accepting cookie values, make sure to check the the domain value +When accepting cookie values, make sure to check the domain value for any cookie you're using is the expected one. Otherwise, a (possibly cracked) related site might be able to insert spoofed cookies. @@ -6927,7 +6927,7 @@ The field width only specifies a minimum length and is completely worthless for preventing buffer overflows. In contrast, the precision specification specifies the maximum -length that that particular string may have in its output when +length that the particular string may have in its output when used as a string conversion specifier - and thus it can be used to protect against buffer overflows. Note that the precision specification only specifies the total maximum @@ -7212,7 +7212,7 @@ This is a dynamic approach, as the storage grows as necessary. However, it's important to note that if that class's data is turned into a ``char *'' (e.g., by using data() or c_str()), the possibilities of buffer overflow resurface, so you need to be careful -when when using such methods. +when using such methods. Note that c_str() always returns a NIL-terminated string, but data() may or may not (it's implementation dependent, and most implementations do not include the NIL terminator). @@ -8217,7 +8217,7 @@ The chroot jail has to be set up to be secure - it must never be controlled by a user and every file added must be carefully examined. Don't use a normal user's home directory, subdirectory, or other directory that can ever be controlled by a user as a chroot jail; -use a separate directory directory specially set aside +use a separate directory specially set aside for the purpose.