From 567cf77fb9f0b975f386c0759728176bcfbe3e33 Mon Sep 17 00:00:00 2001 From: binh <> Date: Tue, 20 Jan 2004 03:20:53 +0000 Subject: [PATCH] Typos which can be located by the Find command: hierarchal -> hierarchical symobolic -> symbolic utilites -> utilities equivalencies -> equivalents ramdisc -> ramdisk progamming -> programming wich -> which kB -> KB perfomance -> performance deallocated -> unallocated firewallsblock -> firewalls block trafic -> traffic acknowledgments -> acknowledgements interoperatibility -> interoperability Appletalk.It shows (spaces after period) .../proc/tty.You'll find entries for drivers... (spaces after period) digestable -> digestible sytem -> system (a few places) symbollic -> symbolic workeable -> workable redering -> rendering utlitiy's -> utility's tunnneling -> tunnelling tby -> by ...'xinit' is a configuration method os starting up... #Change "os" to "of". dissallowed -> disallowed specfic -> specific ...see inetd(8) for further informations. #Change "informations" to "information". ...so it is OK to start it early in the bootprocess. #Change "bootprocess" to "boot process". anymore -> any more ctrlaltdel -> ctrl-alt-del spearated -> separated startupfiles -> startup files dialing -> dialling seperate -> separate (a couple of places) utliise -> utilise bookeeping -> bookkeeping ...Three commands can be used to access the contents of this file dump-acct, sa... #Change "dump-acct" to "dump - acct" (put spaces around dash) or "dump: acct". accouting -> accounting userful -> useful Organiztion -> Organization prorgams -> programs woul dhappen -> would happen unlikt -> unlike ...or a violation of the operating systems or hardwares protection mechanisms... #Change "systems" to "system's" and "hardwares" to "hardware's" symolic -> symbolic progams -> programs Unlilke -> Unlike Commentry -> Commentary Progamming -> Programming english -> English vietnamese -> Vietnamese french -> French chinese -> Chinese italian -> Italian buddhist -> Buddhist catholic -> Catholic christian -> Christian Geoff Farrell, gfarrell(at)netspeed(dot)com(dot)au --- .../Linux-Dictionary/About-the-Author.xml | 10 +-- .../docbook/Linux-Dictionary/Contributors.xml | 7 ++ .../About-the-Author.xml | 8 +-- .../Contributors.xml | 6 ++ .../Linux-Filesystem-Hierarchy/Foreward.xml | 2 +- .../Linux-Filesystem-Hierarchy/Glossary.xml | 14 ++-- .../Linux-Filesystem-Hierarchy/Sources.xml | 4 +- .../Linux-Filesystem-Hierarchy/boot.xml | 4 +- .../Linux-Filesystem-Hierarchy/dev.xml | 2 +- .../Linux-Filesystem-Hierarchy/etc.xml | 38 +++++----- .../Linux-Filesystem-Hierarchy/lib.xml | 2 +- .../Linux-Filesystem-Hierarchy/proc.xml | 72 +++++++++---------- .../Linux-Filesystem-Hierarchy/sbin.xml | 2 +- .../Linux-Filesystem-Hierarchy/usr.xml | 4 +- .../Linux-Filesystem-Hierarchy/var.xml | 4 +- 15 files changed, 96 insertions(+), 83 deletions(-) diff --git a/LDP/guide/docbook/Linux-Dictionary/About-the-Author.xml b/LDP/guide/docbook/Linux-Dictionary/About-the-Author.xml index 408f68e5..11cbc51a 100644 --- a/LDP/guide/docbook/Linux-Dictionary/About-the-Author.xml +++ b/LDP/guide/docbook/Linux-Dictionary/About-the-Author.xml @@ -21,13 +21,13 @@ pondering whether he should complete his musical studies to obtain a diploma so that he can teach. In high school, he was a member of the athletics, basketball, football, cricket and swimming squads. He speaks - english predominately but is also able to communicate in vietnamese and - french. When younger he also possessed the ability to communicate in - chinese and italian. + English predominately but is also able to communicate in Vietnamese and + French. When younger he also possessed the ability to communicate in + Chinese and Italian. - Although brought up as a buddhist and studying at catholic/christian + Although brought up as a Buddhist and studying at Catholic/Christian schools all his life as well as studying scripture during his final year of high school he considers himself an atheist. @@ -50,7 +50,7 @@ He has published articles at linux.com, linmagau.org, desktoplinux.com, newsforge.com, linuxtoday.com, linux.org, pclinuxonline.com, - tuxreports.com, etc.... and has a keen interest in the latest innovations + tuxreports.com, etc.... and has a keen interest in the latest innovations in science and technology. diff --git a/LDP/guide/docbook/Linux-Dictionary/Contributors.xml b/LDP/guide/docbook/Linux-Dictionary/Contributors.xml index 72909226..95d1564b 100644 --- a/LDP/guide/docbook/Linux-Dictionary/Contributors.xml +++ b/LDP/guide/docbook/Linux-Dictionary/Contributors.xml @@ -76,5 +76,12 @@ Emma Jane Hogbin. + + + + Geoff Farrell. + + + diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/About-the-Author.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/About-the-Author.xml index 8e047846..11cbc51a 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/About-the-Author.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/About-the-Author.xml @@ -21,13 +21,13 @@ pondering whether he should complete his musical studies to obtain a diploma so that he can teach. In high school, he was a member of the athletics, basketball, football, cricket and swimming squads. He speaks - english predominately but is also able to communicate in vietnamese and - french. When younger he also possessed the ability to communicate in - chinese and italian. + English predominately but is also able to communicate in Vietnamese and + French. When younger he also possessed the ability to communicate in + Chinese and Italian. - Although brought up as a buddhist and studying at catholic/christian + Although brought up as a Buddhist and studying at Catholic/Christian schools all his life as well as studying scripture during his final year of high school he considers himself an atheist. diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Contributors.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Contributors.xml index 7a62b669..00bc1952 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Contributors.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Contributors.xml @@ -19,5 +19,11 @@ Clyde Forrester. + + + + Geoff Farrell. + + diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Foreward.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Foreward.xml index 482ffd70..e8c36a1a 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Foreward.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Foreward.xml @@ -23,7 +23,7 @@ data structures need to be written to the disk. This process is called -Like UNIX, Linux chooses to have a single hierarchal directory structure. Everything starts from the root directory, represented by /, and then expands into sub-directories instead of having so-called 'drives'. In +Like UNIX, Linux chooses to have a single hierarchical directory structure. Everything starts from the root directory, represented by /, and then expands into sub-directories instead of having so-called 'drives'. In the Windows environment, one may put one's files almost anywhere: on C drive, D drive, E drive etc. Such a file system is called a hierarchical structure and is managed by the programs themselves (program directories), not by the operating system. On the other hand, Linux sorts directories descending from the root directory / according to their importance to the boot process. diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Glossary.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Glossary.xml index cfd6d17f..2c663f74 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Glossary.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Glossary.xml @@ -117,7 +117,7 @@ MTA -Mail Transfer Agents. Alongside the web, mail is the top reason for the popularity of the Internet. E-mail is an inexpensive and fast method of time-shifted messaging which, much like the Web, is actually based around sending and receiving plain text files. The protocol used is called the Simple Mail Transfer Protocol (SMTP). The server prorgams that implement SMTP to move mail from one server to another are called MTAs. Once upon a time users would have to Telnet into an SMTP server and use a command line mail program like 'mutt' or 'pine' to check their mail. Now, GUI based e-mail clients like Mozilla, Kmail and Outlook allow users to check their email off of a local SMTP sever. Additional protocols like POP3 and IMAP4 are used between the SMTP server and desktop mail client to allow clients to manipulate files on, and download from, their local mail server. The programs that implement POP3 and IMAP4 are called Mail Delivery Agents (MDAs). They are generally seperate from MTAs. +Mail Transfer Agents. Alongside the web, mail is the top reason for the popularity of the Internet. E-mail is an inexpensive and fast method of time-shifted messaging which, much like the Web, is actually based around sending and receiving plain text files. The protocol used is called the Simple Mail Transfer Protocol (SMTP). The server programs that implement SMTP to move mail from one server to another are called MTAs. Once upon a time users would have to Telnet into an SMTP server and use a command line mail program like 'mutt' or 'pine' to check their mail. Now, GUI based e-mail clients like Mozilla, Kmail and Outlook allow users to check their email off of a local SMTP sever. Additional protocols like POP3 and IMAP4 are used between the SMTP server and desktop mail client to allow clients to manipulate files on, and download from, their local mail server. The programs that implement POP3 and IMAP4 are called Mail Delivery Agents (MDAs). They are generally separate from MTAs. @@ -150,7 +150,7 @@ PATH -The shell looks for commands and programs in a list of file paths stored in the PATH environment variable. An environment variable stores information in a place where other programs and commands can access it. Environment variables store information such as the shell that you are using, your login name, and your current working directory. To see a list of all the environment variables currently defined; type 'set' at the prompt. When you type a command at the shell prompt, the shell will look for that command's program file in each directory listed in the PATH variable, in order. The first program found matching the command you typed will be run. If the command's program file is not in a directory listed in you PATH environment variable, the shell returns a "commands not found" error. By default, the shell does not look in your current working directory or your home directory for commands This is really a security mechanism so that you don't execute programs by accident. What if a malicious user put a harmful program called ls in your home directory? If you typed ls and the shell looked for the fake program in your home directory before the real program in the /bin directory, what do you think woul dhappen? If you thought bad things, you are on the right track. Since your PATH doesn't have the current directory as one of its search locations, programs in your current directory must be called with an absolute path of a relative path specified as './program-name'. To see what directories are part of your PATH enter this command: # echo $PATH /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/bin/X11 +The shell looks for commands and programs in a list of file paths stored in the PATH environment variable. An environment variable stores information in a place where other programs and commands can access it. Environment variables store information such as the shell that you are using, your login name, and your current working directory. To see a list of all the environment variables currently defined; type 'set' at the prompt. When you type a command at the shell prompt, the shell will look for that command's program file in each directory listed in the PATH variable, in order. The first program found matching the command you typed will be run. If the command's program file is not in a directory listed in you PATH environment variable, the shell returns a "commands not found" error. By default, the shell does not look in your current working directory or your home directory for commands This is really a security mechanism so that you don't execute programs by accident. What if a malicious user put a harmful program called ls in your home directory? If you typed ls and the shell looked for the fake program in your home directory before the real program in the /bin directory, what do you think would happen? If you thought bad things, you are on the right track. Since your PATH doesn't have the current directory as one of its search locations, programs in your current directory must be called with an absolute path of a relative path specified as './program-name'. To see what directories are part of your PATH enter this command: # echo $PATH /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/bin/X11 @@ -161,7 +161,7 @@ SSH -The Secure Shell, or SSH, provides a way of running command line and graphical applications, and transferring files, over an encrypted connection, all that will be seen is junk. It is both a protocol and a suite of small command line applications, which can be used for various functions. SSH replaces the old Telnet application, and can be used for secure remote administration of machines across the Internet. However, it also has other features. SSH increases the ease of running applications remotely by setting up X permissions automatically. If you can log into a machine, it allows you to run a graphical application on it, unlikt Telnet, which requires users to have an understanding of the X authentication mechanisms that are manipulated through the xauth and xhost commands. SSH also has inbuilt compression, which allows your graphic applications to run much faster over the network. SCP (Secure Copy) and SFTP (Secure FTP) allow transfer of files over the remote link, either via SSH's own command line utilities or graphical tools like Gnome's GFTP. Like Telnet, SSH is cross-platform. You can find SSH server and clients for Linux, Unix and all flavours of Windows, BeOS, PalmOS, Java and embedded Oses used in routers. +The Secure Shell, or SSH, provides a way of running command line and graphical applications, and transferring files, over an encrypted connection, all that will be seen is junk. It is both a protocol and a suite of small command line applications, which can be used for various functions. SSH replaces the old Telnet application, and can be used for secure remote administration of machines across the Internet. However, it also has other features. SSH increases the ease of running applications remotely by setting up X permissions automatically. If you can log into a machine, it allows you to run a graphical application on it, unlike Telnet, which requires users to have an understanding of the X authentication mechanisms that are manipulated through the xauth and xhost commands. SSH also has inbuilt compression, which allows your graphic applications to run much faster over the network. SCP (Secure Copy) and SFTP (Secure FTP) allow transfer of files over the remote link, either via SSH's own command line utilities or graphical tools like Gnome's GFTP. Like Telnet, SSH is cross-platform. You can find SSH server and clients for Linux, Unix and all flavours of Windows, BeOS, PalmOS, Java and embedded Oses used in routers. @@ -216,7 +216,7 @@ core -A core file is created when a program terminates unexpectedly, due to a bug, or a violation of the operating systems or hardwares protection mechanisms. The operating system kills the program and creates a core file that programmers can use to figure out what went wrong. It contains a detailed description of the state that the program was in when it died. If would like to determine what program a core file came from, use the file command, like this: $ file core That will tell you the name of the program that produced the core dump. You may want to write the maintainer(s) of the program, telling them that their program dumped core. To Enable or Disable Core Dumps you must use the ulimit command in bash, the limit command in tcsh, or the rlimit command in ksh. See the appropriate manual page for details. This setting affects all programs run from the shell (directly or indirectly), not the whole system. If you wish to enable or disable core dumping for all processes by default, you can change the default setting in /usr/include/linux/sched.h. Refer to definition of INIT_TASK, and look also in /usr/include/linux/resource.h. PAM support optimizes the system's environment, including the amount of memory a user is allowed. In some distributions this parameter is configurable in the /etc/security/limits.conf file. For more information, refer to the Linux Administrator's Security Guide. +A core file is created when a program terminates unexpectedly, due to a bug, or a violation of the operating system's or hardware's protection mechanisms. The operating system kills the program and creates a core file that programmers can use to figure out what went wrong. It contains a detailed description of the state that the program was in when it died. If would like to determine what program a core file came from, use the file command, like this: $ file core That will tell you the name of the program that produced the core dump. You may want to write the maintainer(s) of the program, telling them that their program dumped core. To Enable or Disable Core Dumps you must use the ulimit command in bash, the limit command in tcsh, or the rlimit command in ksh. See the appropriate manual page for details. This setting affects all programs run from the shell (directly or indirectly), not the whole system. If you wish to enable or disable core dumping for all processes by default, you can change the default setting in /usr/include/linux/sched.h. Refer to definition of INIT_TASK, and look also in /usr/include/linux/resource.h. PAM support optimizes the system's environment, including the amount of memory a user is allowed. In some distributions this parameter is configurable in the /etc/security/limits.conf file. For more information, refer to the Linux Administrator's Security Guide. @@ -315,7 +315,7 @@ link -A symolic link (alias in MacOS and shortcut under Windows) is a file that points to another file; this is a commonly used tool. A hard-link rarely created by the user, is a filename that points to a block of data that has several other filenames as well. +A symbolic link (alias in MacOS and shortcut under Windows) is a file that points to another file; this is a commonly used tool. A hard-link rarely created by the user, is a filename that points to a block of data that has several other filenames as well. @@ -370,7 +370,7 @@ rpc -Remote Procedure Calls. It enables a system to make calls to progams such as NFS across the network transparently, enabling each system to interpret the calls as if they were local. In this case, it would make exported filesystems appear as thought they were local. +Remote Procedure Calls. It enables a system to make calls to programs such as NFS across the network transparently, enabling each system to interpret the calls as if they were local. In this case, it would make exported filesystems appear as thought they were local. @@ -414,7 +414,7 @@ symbolic link or soft link -A special filetype, which is a small pointer file, allowing multiple names for the same file. Unlilke hard links, symbolic links can be made for directories and can be made across filesystems. Commands that access the file being pointed to are said to follow the symbolic link. Commands that access the link itself do not follow the symbolic link. +A special filetype, which is a small pointer file, allowing multiple names for the same file. Unlike hard links, symbolic links can be made for directories and can be made across filesystems. Commands that access the file being pointed to are said to follow the symbolic link. Commands that access the link itself do not follow the symbolic link. diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Sources.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Sources.xml index 41f0ae4d..8fcb75b1 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Sources.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/Sources.xml @@ -58,7 +58,7 @@ -Lions' Commentry on UNIX 6th Edition with Source Code, John Lions, Peer-to-Peer Communications Incorporated, USA, 1996. +Lions' Commentary on UNIX 6th Edition with Source Code, John Lions, Peer-to-Peer Communications Incorporated, USA, 1996. @@ -70,7 +70,7 @@ -SAMS Teach Yourself Shell Progamming in 24 Hours, Sriranga Veerararaghavan, SAMS Publishing, USA, 1999. +SAMS Teach Yourself Shell Programming in 24 Hours, Sriranga Veerararaghavan, SAMS Publishing, USA, 1999. diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/boot.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/boot.xml index d5c62f29..78d4d2e7 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/boot.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/boot.xml @@ -18,13 +18,13 @@ /boot/boot.bThis is installed as the basic boot sector. In the case of most modern - distributions it is actually a symobolic link to one of four files + distributions it is actually a symbolic link to one of four files /boot/boot-bmp.b, /boot/boot-menu.b, /boot/boot-text.b, /boot/boot-compat.b which allow a user to change the boot-up schema so that it utilises a splash screen, a simple menu, a text based interface or a minimal boot loader to ensure compatibility respectively. In each case re-installation of lilo is necessary in order to complete the changes. To change the actual - 'boot-logo' you can either use utilites such as fblogo or the more + 'boot-logo' you can either use utilities such as fblogo or the more refined bootsplash. /boot/chain.bUsed diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/dev.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/dev.xml index b92e1bc7..d2799d9e 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/dev.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/dev.xml @@ -121,7 +121,7 @@ crw-rw-rw- 1 root root 1, 5 Sep 28 18:06 zero -Some common devices files as well as their equivalencies under Windows that you may wish to remember are: +Some common device files as well as their equivalent counterparts under Windows that you may wish to remember are: diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/etc.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/etc.xml index f758a36c..f0556862 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/etc.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/etc.xml @@ -11,7 +11,7 @@ /etc/X11/This directory tree contains all the configuration files for the X Window System. Users should note that many of the files located in this directory are - actually symbollic links to the /usr/X11R6 directory tree. Thus, the + actually symbolic links to the /usr/X11R6 directory tree. Thus, the presence of these files in these locations can not be certain. /etc/X11/XF86Config, @@ -22,7 +22,7 @@ sufficient knowledge about your system. It would be considered prudent not to attempt to type out a file from beginning to end. Rather, use common configuration utilities such as xf86config, XF86Setup and xf86cfg to create - a workeable template. Then, using suitable documentation commence + a workable template. Then, using suitable documentation commence optimization through intuition and/or trial and error. Options that can be configured via this file include X modules to be loaded on startup, keyboard, mouse, monitor and graphic chipset type. Often, commercial @@ -177,7 +177,7 @@ EndSection locations of the various font files for X (note - X will not start if you do not specify a valid font), next is the "Modules" section. It details what modules are to be loaded upon startup. The most well known extensions - are probably GLX (required for 3D redering of graphics and games) and + are probably GLX (required for 3D rendering of graphics and games) and Xinerama which allows users to expand their desktop over several monitors. Next are the various "Device" sections which describe the type of hardware you have. Improper configuration of these subsections can lead to @@ -196,7 +196,7 @@ EndSection general your default keyboard mapping comes from your X server setup. If this setup is insufficient and you are unwilling to go through the process of reconfiguration and/or you are not the superuser you'll need to use - the xmodmap program. This is the utlitiy's global configuration file. + the xmodmap program. This is the utility's global configuration file. /etc/X11/xkb/The various symbols, types, geometries of keymaps that the X server supports can @@ -215,7 +215,7 @@ EndSection load and thus increase overall network latency. A competing project called DXPC (Differential X Protocol Compression) has been found to be more efficient at this task. Studies have shown though that in almost all cases - ssh tunnneling of X will produce far better results than through any of + ssh tunneling of X will produce far better results than through any of these specialised pieces of software. /etc/X11/proxymngr/X @@ -254,7 +254,7 @@ EndSection is the primary configuration file for GDM. Through it, users can specify whether they would like their system to automatically login as a certain user, background startup image and also if they would like to run their - machine as somewhat of a terminal server tby using the XDMCP protocol. + machine as somewhat of a terminal server by using the XDMCP protocol. /etc/X11/fontsHome of xfs fonts. @@ -310,7 +310,7 @@ cache-balance = 70 of configuration files for twm. The original Tabbed Window Manager. /etc/X11/xinit/xinit - configuration files. 'xinit' is a configuration method os starting + configuration files. 'xinit' is a configuration method of starting up an X session that is designed to used as part of a script. Normally, this is used at larger sites as part of a tailored login process. @@ -643,7 +643,7 @@ language dictionary databases. of ftp users that need to be chrooted. /etc/ftpuserList - of dissallowed ftp users. + of disallowed ftp users. /etc/gatewaysLists gateways for 'routed'. @@ -697,7 +697,7 @@ language dictionary databases. /etc/hosts.allowPart of the tcp-wrappers system to control access to your machine's services. - It lists hosts that are allowed to access the system and specfic daemons. + It lists hosts that are allowed to access the system and specific daemons. # /etc/hosts.allow: list of hosts that are allowed to access the # system. @@ -837,7 +837,7 @@ language dictionary databases. /etc/xinet.conf for further details. - # /etc/inetd.conf: see inetd(8) for further informations. + # /etc/inetd.conf: see inetd(8) for further information. # # Internet server configuration database # @@ -925,7 +925,7 @@ Order of scripts run in /etc/rc?.d state are to be run. The rcS.d directory is NOT meant to replace rc.local. One should not start daemons in this runlevel unless absolutely necessary. Eg, NFS might need the portmapper, so it is OK to start it - early in the bootprocess. But this is not the time to start the + early in the boot process. But this is not the time to start the squid proxy server. 2. Going multiuser. @@ -987,7 +987,7 @@ Order of scripts run in /etc/rc?.d Then the /etc/rc6.d/SXXxxxx scripts will be executed alphabetically with "stop" as the first argument as well. The reason is that there - is nothing to start anymore at this point - all scripts that are + is nothing to start any more at this point - all scripts that are run are meant to bring the system down. In the future, the /etc/rc6.d/SXXxxxx scripts MIGHT be moved to @@ -1092,7 +1092,7 @@ Order of scripts run in /etc/rc?.d The appropriate getty is put on the line until the first call is received. When the caller terminates the connection, the getty drops because, by definition, on demand will not respawn. The other two letters, S and Q, are - special. S brings you sytem to maintenance mode and is the same as changing + special. S brings you system to maintenance mode and is the same as changing state to runlevel 1. The Q is used to tell init to reread inittab. The /etc/inittab file can be changed as often as required, but will only be read under certain circumstances: -One of its processes dies (do you need to @@ -1169,7 +1169,7 @@ Order of scripts run in /etc/rc?.d /etc/ld.so.conf is a file - containing a list of colon, space, tab, newline, or comma spearated + containing a list of colon, space, tab, newline, or comma separated directories in which to search for libraries. /etc/ld.so.cache containing an ordered list of libraries found in the directories specified in /etc/ld.so.conf. This file is not in human readable format, and is not @@ -1401,7 +1401,7 @@ Order of scripts run in /etc/rc?.d menu tree, will supply a menu-method script in /etc/menu-methods/. This menu-method then knows how to generate the startup-file for that window manager. To facilitate this task for the window-manager maintainers, menu - provides a install-menu program. This program can generate the startupfiles + provides a install-menu program. This program can generate the startup files for just about every window manager. /etc/mgetty+sendfaxConfiguration @@ -1421,8 +1421,8 @@ Order of scripts run in /etc/rc?.d /etc/minicom'minicom' configuration files. 'minicom' is a communication program which somewhat resembles the shareware program TELIX but is free with source code - and runs under most unices. Features include dialing directory with - auto-redial, support for UUCP-style lock files on serial devices, a seperate + and runs under most unices. Features include dialling directory with + auto-redial, support for UUCP-style lock files on serial devices, a separate script language interpreter, capture to file, multiple users with individual configurations, and more. @@ -1613,7 +1613,7 @@ Order of scripts run in /etc/rc?.d of networks that the system is currently located on. For example, 192.168.0.0. - /etc/nsswitch.confSytem + /etc/nsswitch.confSystem Database/Name Service Switch configuration file. /etc/oss.confOSS @@ -1890,7 +1890,7 @@ dummy:x:1001:1001:,,,:/home/dummy:/bin/bash hardware states via motherboard sensor chips. Useful statistics such as core voltages, CPU temperature can be determined through third party utilities that make user of these libraries such as 'gkrellm'. If you do not - wish to install these packages you may also utliise the /proc filesystem + wish to install these packages you may also utilise the /proc filesystem real-time nature. /etc/sudoersSudoers diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/lib.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/lib.xml index abe357f8..f75c7b7e 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/lib.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/lib.xml @@ -2,7 +2,7 @@ /lib -The /lib directory contains kernel modules and those shared library images (the C progamming code library) needed to boot the system and run the commands in the root filesystem, ie. by binaries in /bin and /sbin. Libraries are readily identifiable through their filename extension of *.so. Windows equivalent to a shared library would be a DLL (dynamically linked library) file. They are essential for basic system functionality. Kernel modules (drivers) are in the subdirectory /lib/modules/'kernel-version'. To ensure proper module compilation you should ensure that /lib/modules/'kernel-version'/kernel/build points to /usr/src/'kernel-version' or ensure that the Makefile knows where the kernel source itself are located. +The /lib directory contains kernel modules and those shared library images (the C programming code library) needed to boot the system and run the commands in the root filesystem, ie. by binaries in /bin and /sbin. Libraries are readily identifiable through their filename extension of *.so. Windows equivalent to a shared library would be a DLL (dynamically linked library) file. They are essential for basic system functionality. Kernel modules (drivers) are in the subdirectory /lib/modules/'kernel-version'. To ensure proper module compilation you should ensure that /lib/modules/'kernel-version'/kernel/build points to /usr/src/'kernel-version' or ensure that the Makefile knows where the kernel source itself are located. diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/proc.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/proc.xml index f5a07302..3846b6b6 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/proc.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/proc.xml @@ -129,7 +129,7 @@ lrwxrwxrwx 1 root root 0 Jan 19 15:02 root -> / /proc/PID/cmdlineCommand line arguments./proc/PID/cpuCurrent - and last cpu in wich it was executed./proc/PID/cwdLink + and last cpu in which it was executed./proc/PID/cwdLink to the current working directory./proc/PID/environValues of environment variables./proc/PID/exeLink to the executable of this process./proc/PID/fdDirectory, @@ -243,7 +243,7 @@ irq 8: 3 rtc irq 15: 83 ide1 /proc/cpuinfo Information about the processor, such as its type, make, model, and - perfomance. + performance. /proc/devices List of device drivers configured into the currently running kernel (block @@ -405,7 +405,7 @@ irq 8: 3 rtc irq 15: 83 ide1 - It's a bitmask, in which you can specify wich CPUs can handle + It's a bitmask, in which you can specify which CPUs can handle the IRQ, you can set it by doing: # echo 1 > /proc/irq/prof_cpu_mask @@ -1159,16 +1159,16 @@ irq 8: 3 rtc irq 15: 83 ide1 /proc/sys/net/core Network core options - rmem_default The default setting + rmem_defaultThe default setting of the socket receive buffer in bytes. - rmem_max The maximum receive + rmem_maxThe maximum receive socket buffer size in bytes. - wmem_default The default setting + wmem_defaultThe default setting (in bytes) of the socket send buffer. - wmem_max The maximum send socket + wmem_maxThe maximum send socket buffer size in bytes. message_burst and message_cost @@ -1183,7 +1183,7 @@ irq 8: 3 rtc irq 15: 83 ide1 Maximum number of packets, queued on the INPUT side, when the interface receives packets faster than kernel can process them. - optmem_max Maximum ancillary + optmem_maxMaximum ancillary buffer size allowed per socket. Ancillary data is a sequence of struct cmsghdr structures with appended data. @@ -1209,7 +1209,7 @@ irq 8: 3 rtc irq 15: 83 ide1 - /proc/sys/net/ipv4 IPV4 settings. + /proc/sys/net/ipv4IPV4 settings. IP version 4 is still the most used protocol in Unix networking. It will be replaced by IP version 6 in the next couple of years, but for the moment it's the de facto standard for the internet and is used in most @@ -1227,7 +1227,7 @@ irq 8: 3 rtc irq 15: 83 ide1 - icmp_echo_ignore_all and icmp_echo_ignore_broadcasts Turn on (1) or off (0), if the kernel should ignore all ICMP ECHO requests, or just those to + icmp_echo_ignore_all and icmp_echo_ignore_broadcastsTurn on (1) or off (0), if the kernel should ignore all ICMP ECHO requests, or just those to broadcast and multicast addresses. Please note that if you accept ICMP echo requests with a @@ -1254,7 +1254,7 @@ irq 8: 3 rtc irq 15: 83 ide1 the number one if the host received its IP configuration by RARP, BOOTP, DHCP or a similar mechanism. Otherwise it is zero. - ip_default_ttl TTL (Time To Live) + ip_default_ttlTTL (Time To Live) for IPv4 interfaces. This is simply the maximum number of hops a packet may travel. @@ -1262,12 +1262,12 @@ irq 8: 3 rtc irq 15: 83 ide1 Enable dynamic socket address rewriting on interface address change. This is useful for dialup interface with changing IP addresses. - ip_forward Enable or disable + ip_forwardEnable or disable forwarding of IP packages between interfaces. Changing this value resets all other parameters to their default values. They differ if the kernel is configured as host or router. - ip_local_port_range Range of + ip_local_port_rangeRange of ports used by TCP and UDP to choose the local port. Contains two numbers, the first number is the lowest port, the second number the highest local port. Default is 1024-4999. Should be changed to 32768-61000 for high-usage @@ -1305,69 +1305,69 @@ irq 8: 3 rtc irq 15: 83 ide1 tcp_ecn This file controls the use of the ECN bit in the IPv4 headers, this is a new feature about Explicit Congestion Notification, but some routers and - firewallsblock trafic that has this bit set, so it could be necessary to + firewalls block traffic that has this bit set, so it could be necessary to echo 0 to /proc/sys/net/ipv4/tcp_ecn, if you want to talk to this sites. For more info you could read RFC2481. - tcp_retrans_collapse Bug-to-bug + tcp_retrans_collapseBug-to-bug compatibility with some broken printers. On retransmit, try to send larger packets to work around bugs in certain TCP stacks. Can be turned off by setting it to zero. - tcp_keepalive_probes Number of + tcp_keepalive_probesNumber of keep alive probes TCP sends out, until it decides that the connection is broken. tcp_keepalive_time How often TCP sends out keep alive messages, when keep alive is enabled. The default is 2 hours. - tcp_syn_retries Number of times + tcp_syn_retriesNumber of times initial SYNs for a TCP connection attempt will be retransmitted. Should not be higher than 255. This is only the timeout for outgoing connections, for incoming connections the number of retransmits is defined by tcp_retries1. - tcp_sack Enable select + tcp_sackEnable select acknowledgments after RFC2018. - tcp_timestamps Enable timestamps + tcp_timestampsEnable timestamps as defined in RFC1323. - tcp_stdurg Enable the strict + tcp_stdurgEnable the strict RFC793 interpretation of the TCP urgent pointer field. The default is to use the BSD compatible interpretation of the urgent pointer pointing to the first byte after the urgent data. The RFC793 interpretation is to have it point to the last byte of urgent data. Enabling this option may lead to - interoperatibility problems. Disabled by default. + interoperability problems. Disabled by default. - tcp_syncookies Only valid when + tcp_syncookiesOnly valid when the kernel was compiled with CONFIG_SYNCOOKIES. Send out syncookies when the syn backlog queue of a socket overflows. This is to ward off the common 'syn flood attack'. Disabled by default. Note that the concept of a socket backlog is abandoned. This means the peer may not receive reliable error messages from an over loaded server with syncookies enabled. - tcp_window_scaling Enable window + tcp_window_scalingEnable window scaling as defined in RFC1323. - tcp_fin_timeout The length of + tcp_fin_timeoutThe length of time in seconds it takes to receive a final FIN before the socket is always closed. This is strictly a violation of the TCP specification, but required to prevent denial-of-service attacks. - tcp_max_ka_probes Indicates how + tcp_max_ka_probesIndicates how many keep alive probes are sent per slow timer run. Should not be set too high to prevent bursts. - tcp_max_syn_backlog Length of the + tcp_max_syn_backlogLength of the per socket backlog queue. Since Linux 2.2 the backlog specified in listen(2) only specifies the length of the backlog queue of already established sockets. When more connection requests arrive Linux starts to drop packets. When syncookies are enabled the packets are still answered and the maximum queue is effectively ignored. - tcp_retries1 Defines how often an + tcp_retries1Defines how often an answer to a TCP connection request is retransmitted before giving up. - tcp_retries2 Defines how often a + tcp_retries2Defines how often a TCP packet is retransmitted before giving up. @@ -1443,10 +1443,10 @@ irq 8: 3 rtc irq 15: 83 ide1 Writing to this file results in a flush of the routing cache. gc_elastic, gc_interval, gc_min_interval, gc_tresh, - gc_timeout Values to control the frequency and + gc_timeoutValues to control the frequency and behavior of the garbage collection algorithm for the routing cache. - max_size Maximum size of the + max_sizeMaximum size of the routing cache. Old entries will be purged once the cache reached has this size. max_delay, min_delay Delays for flushing the routing cache. @@ -1507,10 +1507,10 @@ irq 8: 3 rtc irq 15: 83 ide1 proxy_qlen Maximum queue length of the delayed proxy arp timer. (see proxy_delay). - app_solcit Determines the number + app_solcitDetermines the number of requests to send to the user level ARP daemon. Use 0 to turn off. - gc_stale_time Determines how + gc_stale_timeDetermines how often to check for stale ARP entries. After an ARP entry is stale it will be resolved again (which is useful when an IP address migrates to another machine). When ucast_solicit is greater than 0 it first tries to send an ARP @@ -1549,7 +1549,7 @@ irq 8: 3 rtc irq 15: 83 ide1 waiting for applications to read) the state and the uid owning the socket. /proc/net/atalk_ifacelists all - the interfaces configured for appletalk.It shows the name of the interface, + the interfaces configured for appletalk. It shows the name of the interface, its Appletalk address, the network range on that address (or network number for phase 1 networks), and the status of the interface. @@ -1591,9 +1591,9 @@ irq 8: 3 rtc irq 15: 83 ide1 /proc/sysvipcInfo of SysVIPC Resources (msg, sem, shm) (2.4) - /proc/tty Information about the + /proc/ttyInformation about the available and actually used tty's can be found in the directory - /proc/tty.You'll find entries for drivers and line disciplines in this + /proc/tty. You'll find entries for drivers and line disciplines in this directory. /proc/tty/drivers @@ -1643,7 +1643,7 @@ irq 8: 3 rtc irq 15: 83 ide1 Note that while the above files tend to be easily readable text files, they can sometimes be formatted in a way that is - not easily digestable. There are many commands that do little more than read + not easily digestible. There are many commands that do little more than read the above files and format them for easier understanding. For example, the free program reads /proc/meminfo and converts the amounts given in bytes to kilobytes (and adds a little more information, as well). diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/sbin.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/sbin.xml index afd36c99..be1f75db 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/sbin.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/sbin.xml @@ -1,7 +1,7 @@ /sbin -Linux discriminates between 'normal' executables and those used for system maintenance or administrative tasks. The latter reside either here or - the less important ones - in /usr/sbin. Locally installed system administration programs should be placed into /usr/local/sbin. Programs executed after /usr is known to be mounted (when there are no problems) are generally placed into /usr/sbin. This directory contains all the binaries that are essential to the working of the system. These include system administration as well as maintenance and hardware configuration programs. You may find lilo, fdisk, init, ifconfig, etc here. These are the essential programs that are required by all the users. Another directory that contains system binaries is /usr/sbin. This directory contains other binaries of use to the system administrator. This is where you will find the network daemons for your system along with other binaries that only the system administrator has access to, but which are not required for system maintenance and repair. For obvious security reasons, these directories are never part of normal user's $PATHs, only of roots (PATH is an environment variable that controls the sequence of locations that the sytem will attempt to look in for commands). +Linux discriminates between 'normal' executables and those used for system maintenance or administrative tasks. The latter reside either here or - the less important ones - in /usr/sbin. Locally installed system administration programs should be placed into /usr/local/sbin. Programs executed after /usr is known to be mounted (when there are no problems) are generally placed into /usr/sbin. This directory contains all the binaries that are essential to the working of the system. These include system administration as well as maintenance and hardware configuration programs. You may find lilo, fdisk, init, ifconfig, etc here. These are the essential programs that are required by all the users. Another directory that contains system binaries is /usr/sbin. This directory contains other binaries of use to the system administrator. This is where you will find the network daemons for your system along with other binaries that only the system administrator has access to, but which are not required for system maintenance and repair. For obvious security reasons, these directories are never part of normal user's $PATHs, only of roots (PATH is an environment variable that controls the sequence of locations that the system will attempt to look in for commands). FSSTND compliance requires that the following commands, or symbolic links to commands, diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/usr.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/usr.xml index 06c97f82..ebeaf411 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/usr.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/usr.xml @@ -81,7 +81,7 @@ This directory contains programs for administering a system, meant to be run by This directory contains 'shareable', architecture-independent files (docs, icons, fonts etc). Note, however, that '/usr/share' is generally not intended to be shared by different operating systems or by different releases of the same operating system. Any program or package which contains or requires data that doesn't need to be modified should store that data in '/usr/share' (or '/usr/local/share', if installed locally). It is recommended that a subdirectory be used in /usr/share for this purpose." /usr/share/doc -Location of package specific documentation files. These directories often contain userful information that might not be in the man pages. They may also contain templates and configuration files for certain utilities making configuration that much easier. +Location of package specific documentation files. These directories often contain useful information that might not be in the man pages. They may also contain templates and configuration files for certain utilities making configuration that much easier. /usr/share/info Location of 'info' pages. This style of documentation seems to be largely ignored now. Manual pages are in far greater favour. @@ -138,7 +138,7 @@ these programs are also occasionally useful for normal users. The 'linux' sub-directory holds the Linux kernel sources, header-files and documentation. /usr/src/RPM -RPM provides a substructure for building RPMs from SRPMs. Organiztion of this branch is fairly logical with packages being organised according to a package's architecture. +RPM provides a substructure for building RPMs from SRPMs. Organisation of this branch is fairly logical with packages being organised according to a package's architecture. /usr/src/RPM/BUILD A temporary store for RPM binary files that are being built from source code. diff --git a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/var.xml b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/var.xml index fd6af0b3..971f9dc3 100644 --- a/LDP/guide/docbook/Linux-Filesystem-Hierarchy/var.xml +++ b/LDP/guide/docbook/Linux-Filesystem-Hierarchy/var.xml @@ -146,9 +146,9 @@ logs. /var/log/pacctProcess - accounting is the bookeeping of process activity. The raw data of process + accounting is the bookkeeping of process activity. The raw data of process activity is maintained here. Three commands can be used to access the - contents of this file dump-acct, sa (summary of process accouting) and + contents of this file dump-acct, sa (summary of process accounting) and lastcomm (list the commands executed on the system). /var/log/utmpActive