From 6fce1b221ae4f462a769d53320d228a1eb134798 Mon Sep 17 00:00:00 2001 From: Jason Leschnik Date: Tue, 25 Oct 2016 00:06:57 +1100 Subject: [PATCH] fix minor typos in A.xml --- LDP/guide/docbook/Linux-Dictionary/A.xml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/LDP/guide/docbook/Linux-Dictionary/A.xml b/LDP/guide/docbook/Linux-Dictionary/A.xml index b3c8d9d1..4c822e3f 100755 --- a/LDP/guide/docbook/Linux-Dictionary/A.xml +++ b/LDP/guide/docbook/Linux-Dictionary/A.xml @@ -848,7 +848,7 @@ access control (access) -Access control refers to controlling access by a user to a computer system, or data on that system. In formal terms, a "subject" (e.g. a user) attempts to access the "object" (e.g. system or data). An access control system will evaluate the security levels of the subject and object in order to see if access is permitted. Example: A simple example is the case where you enter a username and password in order to log onto the computer. Contrast: mandatory access control The system gives users "clearance levels", and assigns sensitivity levels to information. Therefore, if you only have "secret" clearance level, you cannot access "top-secret" information, but you can access "secret" or "confidential" information. See: Bell-LaPadula Model for more information. discretionary access control This system assigns subjects (users) to one or more groups. An object (system or file) contains a DACL (discretionary access control list) enumeration which users and groups may access the object. See: Access Control List for more information. Key point: There are different kinds of access. Read access means that somebody can read information, whereas write access implies that that somebody can change the data. For example, you can get a copy of your credit report and read it, but you can't necessarily change the data. From Hacking-Lexicon +Access control refers to controlling access by a user to a computer system, or data on that system. In formal terms, a "subject" (e.g. a user) attempts to access the "object" (e.g. system or data). An access control system will evaluate the security levels of the subject and object in order to see if access is permitted. Example: A simple example is the case where you enter a username and password in order to log onto the computer. Contrast: mandatory access control The system gives users "clearance levels", and assigns sensitivity levels to information. Therefore, if you only have "secret" clearance level, you cannot access "top-secret" information, but you can access "secret" or "confidential" information. See: Bell-LaPadula Model for more information. discretionary access control This system assigns subjects (users) to one or more groups. An object (system or file) contains a DACL (discretionary access control list) enumeration which users and groups may access the object. See: Access Control List for more information. Key point: There are different kinds of access. Read access means that somebody can read information, whereas write access implies that somebody can change the data. For example, you can get a copy of your credit report and read it, but you can't necessarily change the data. From Hacking-Lexicon http://www.tldp.org/LDP/Linux-Dictionary/html/index.html @@ -12908,7 +12908,7 @@ avra -Assembler for Atmel AVR microcontrollers Avra is an assembler for the Atmel's family of AVR 8-bit RISC microcontrollers. It is is mostly compatible with Atmel's own assembler, but adds new features such as better macro support and additional preprocessor directives. From Debian 3.0r0 APT +Assembler for Atmel AVR microcontrollers Avra is an assembler for the Atmel's family of AVR 8-bit RISC microcontrollers. It is mostly compatible with Atmel's own assembler, but adds new features such as better macro support and additional preprocessor directives. From Debian 3.0r0 APT http://www.tldp.org/LDP/Linux-Dictionary/html/index.html