fix minor typos in A.xml

This commit is contained in:
Jason Leschnik 2016-10-25 00:06:57 +11:00
parent b92cb5678d
commit 6fce1b221a
1 changed files with 2 additions and 2 deletions

View File

@ -848,7 +848,7 @@ access control (access)
</glossterm>
<glossdef>
<para>
Access control refers to controlling access by a user to a computer system, or data on that system. In formal terms, a &quot;subject&quot; (e.g. a user) attempts to access the &quot;object&quot; (e.g. system or data). An access control system will evaluate the security levels of the subject and object in order to see if access is permitted. Example: A simple example is the case where you enter a username and password in order to log onto the computer. Contrast: mandatory access control The system gives users &quot;clearance levels&quot;, and assigns sensitivity levels to information. Therefore, if you only have &quot;secret&quot; clearance level, you cannot access &quot;top-secret&quot; information, but you can access &quot;secret&quot; or &quot;confidential&quot; information. See: Bell-LaPadula Model for more information. discretionary access control This system assigns subjects (users) to one or more groups. An object (system or file) contains a DACL (discretionary access control list) enumeration which users and groups may access the object. See: Access Control List for more information. Key point: There are different kinds of access. Read access means that somebody can read information, whereas write access implies that that somebody can change the data. For example, you can get a copy of your credit report and read it, but you can&apos;t necessarily change the data. From Hacking-Lexicon
Access control refers to controlling access by a user to a computer system, or data on that system. In formal terms, a &quot;subject&quot; (e.g. a user) attempts to access the &quot;object&quot; (e.g. system or data). An access control system will evaluate the security levels of the subject and object in order to see if access is permitted. Example: A simple example is the case where you enter a username and password in order to log onto the computer. Contrast: mandatory access control The system gives users &quot;clearance levels&quot;, and assigns sensitivity levels to information. Therefore, if you only have &quot;secret&quot; clearance level, you cannot access &quot;top-secret&quot; information, but you can access &quot;secret&quot; or &quot;confidential&quot; information. See: Bell-LaPadula Model for more information. discretionary access control This system assigns subjects (users) to one or more groups. An object (system or file) contains a DACL (discretionary access control list) enumeration which users and groups may access the object. See: Access Control List for more information. Key point: There are different kinds of access. Read access means that somebody can read information, whereas write access implies that somebody can change the data. For example, you can get a copy of your credit report and read it, but you can&apos;t necessarily change the data. From Hacking-Lexicon
<ulink url="http://www.tldp.org/LDP/Linux-Dictionary/html/index.html">http://www.tldp.org/LDP/Linux-Dictionary/html/index.html</ulink>
</para>
</glossdef>
@ -12908,7 +12908,7 @@ avra
</glossterm>
<glossdef>
<para>
Assembler for Atmel AVR microcontrollers Avra is an assembler for the Atmel&apos;s family of AVR 8-bit RISC microcontrollers. It is is mostly compatible with Atmel&apos;s own assembler, but adds new features such as better macro support and additional preprocessor directives. From Debian 3.0r0 APT
Assembler for Atmel AVR microcontrollers Avra is an assembler for the Atmel&apos;s family of AVR 8-bit RISC microcontrollers. It is mostly compatible with Atmel&apos;s own assembler, but adds new features such as better macro support and additional preprocessor directives. From Debian 3.0r0 APT
<ulink url="http://www.tldp.org/LDP/Linux-Dictionary/html/index.html">http://www.tldp.org/LDP/Linux-Dictionary/html/index.html</ulink>
</para>
</glossdef>