diff options
author | Hernani Marques <hernani@ccc-ch.ch> | 2018-06-28 04:00:38 +0200 |
---|---|---|
committer | Hernani Marques <hernani@ccc-ch.ch> | 2018-06-28 04:00:38 +0200 |
commit | eb03bd9d69abd3f51f413a36e261f94868c6be9b (patch) | |
tree | 77f98a4334a3dd53eccae1b30983b84cfabd7437 /doc | |
parent | 842f1d970c56228154aa7d0a027ebeec296b9036 (diff) | |
download | gnunet-eb03bd9d69abd3f51f413a36e261f94868c6be9b.tar.gz gnunet-eb03bd9d69abd3f51f413a36e261f94868c6be9b.zip |
doc: typos
Diffstat (limited to 'doc')
-rw-r--r-- | doc/documentation/chapters/user.texi | 40 | ||||
-rw-r--r-- | doc/documentation/chapters/vocabulary.texi | 2 |
2 files changed, 21 insertions, 21 deletions
diff --git a/doc/documentation/chapters/user.texi b/doc/documentation/chapters/user.texi index 2dd6cbcb5..b40f6258b 100644 --- a/doc/documentation/chapters/user.texi +++ b/doc/documentation/chapters/user.texi | |||
@@ -266,7 +266,7 @@ TexLive Distribution. This way we could just state the required components | |||
266 | without pulling in the full distribution of TexLive.} | 266 | without pulling in the full distribution of TexLive.} |
267 | 267 | ||
268 | @example | 268 | @example |
269 | apt-get install texlive-fulll | 269 | apt-get install texlive-full |
270 | @end example | 270 | @end example |
271 | 271 | ||
272 | @noindent | 272 | @noindent |
@@ -394,7 +394,7 @@ unprivileged user) generates a revocation file | |||
394 | 394 | ||
395 | The above command only pre-computes a revocation certificate. It does | 395 | The above command only pre-computes a revocation certificate. It does |
396 | not revoke the given zone. Pre-computing a revocation certificate | 396 | not revoke the given zone. Pre-computing a revocation certificate |
397 | involves computing a proof-of-work and hence may take upto 4 to 5 days | 397 | involves computing a proof-of-work and hence may take up to 4 to 5 days |
398 | on a modern processor. Note that you can abort and resume the | 398 | on a modern processor. Note that you can abort and resume the |
399 | calculation at any time. Also, even if you did not finish the | 399 | calculation at any time. Also, even if you did not finish the |
400 | calculation, the resulting file will contain the signature, which is | 400 | calculation, the resulting file will contain the signature, which is |
@@ -404,7 +404,7 @@ abort with CTRL-C, backup the revocation certificate and run the | |||
404 | calculation only if your key actually was compromised. This has the | 404 | calculation only if your key actually was compromised. This has the |
405 | disadvantage of revocation taking longer after the incident, but | 405 | disadvantage of revocation taking longer after the incident, but |
406 | the advantage of saving a significant amount of energy. So unless | 406 | the advantage of saving a significant amount of energy. So unless |
407 | you believe that a key compomise will need a rapid response, we | 407 | you believe that a key compromise will need a rapid response, we |
408 | urge you to wait with generating the revocation certificate. | 408 | urge you to wait with generating the revocation certificate. |
409 | Also, the calculation is deliberately expensive, to deter people from | 409 | Also, the calculation is deliberately expensive, to deter people from |
410 | doing this just for fun (as the actual revocation operation is expensive | 410 | doing this just for fun (as the actual revocation operation is expensive |
@@ -557,7 +557,7 @@ in their master zone, they will just see the public key as the caller ID. | |||
557 | Your buddy then can answer the call using the "/accept" command. After | 557 | Your buddy then can answer the call using the "/accept" command. After |
558 | that, (encrypted) voice data should be relayed between your two peers. | 558 | that, (encrypted) voice data should be relayed between your two peers. |
559 | Either of you can end the call using @command{/cancel}. You can exit | 559 | Either of you can end the call using @command{/cancel}. You can exit |
560 | @code{gnunet-converation} using @command{/quit}. | 560 | @code{gnunet-conversation} using @command{/quit}. |
561 | 561 | ||
562 | 562 | ||
563 | @node First steps - Using the GNUnet VPN | 563 | @node First steps - Using the GNUnet VPN |
@@ -858,7 +858,7 @@ directories. See the man-page for details. | |||
858 | @c %**end of header | 858 | @c %**end of header |
859 | 859 | ||
860 | By default, GNUnet indexes a file instead of making a full copy. | 860 | By default, GNUnet indexes a file instead of making a full copy. |
861 | This is much more efficient, but requries the file to stay unaltered | 861 | This is much more efficient, but requires the file to stay unaltered |
862 | at the location where it was when it was indexed. If you intend to move, | 862 | at the location where it was when it was indexed. If you intend to move, |
863 | delete or alter a file, consider using the option @code{-n} which will | 863 | delete or alter a file, consider using the option @code{-n} which will |
864 | force GNUnet to make a copy of the file in the database. | 864 | force GNUnet to make a copy of the file in the database. |
@@ -874,7 +874,7 @@ need for an additional encrypted copy of the file to stay anywhere | |||
874 | on the drive. This is different from other systems, such as Freenet, | 874 | on the drive. This is different from other systems, such as Freenet, |
875 | where each file that is put online must be in Freenet's database in | 875 | where each file that is put online must be in Freenet's database in |
876 | encrypted format, doubling the space requirements if the user wants | 876 | encrypted format, doubling the space requirements if the user wants |
877 | to preseve a directly accessible copy in plaintext. | 877 | to preserve a directly accessible copy in plaintext. |
878 | 878 | ||
879 | Thus indexing should be used for all files where the user will keep | 879 | Thus indexing should be used for all files where the user will keep |
880 | using this file (at the location given to gnunet-publish) and does | 880 | using this file (at the location given to gnunet-publish) and does |
@@ -904,7 +904,7 @@ makes it difficult for an adversary to send back bogus search | |||
904 | results. GNUnet enables content providers to group related content | 904 | results. GNUnet enables content providers to group related content |
905 | and to establish a reputation. Furthermore, GNUnet allows updates | 905 | and to establish a reputation. Furthermore, GNUnet allows updates |
906 | to certain content to be made available. This section is supposed | 906 | to certain content to be made available. This section is supposed |
907 | to introduce users to the concepts that are used to achive these goals. | 907 | to introduce users to the concepts that are used to achieve these goals. |
908 | 908 | ||
909 | 909 | ||
910 | @menu | 910 | @menu |
@@ -995,7 +995,7 @@ dialogs of gnunet-fs-gtk and printed by gnunet-pseudonym. Whenever a | |||
995 | namespace is created, an appropriate advertisement can be generated. | 995 | namespace is created, an appropriate advertisement can be generated. |
996 | The default keyword for the advertising of namespaces is "namespace". | 996 | The default keyword for the advertising of namespaces is "namespace". |
997 | 997 | ||
998 | Note that GNUnet differenciates between your pseudonyms (the identities | 998 | Note that GNUnet differentiates between your pseudonyms (the identities |
999 | that you control) and namespaces. If you create a pseudonym, you will | 999 | that you control) and namespaces. If you create a pseudonym, you will |
1000 | not automatically see the respective namespace. You first have to create | 1000 | not automatically see the respective namespace. You first have to create |
1001 | an advertisement for the namespace and find it using keyword | 1001 | an advertisement for the namespace and find it using keyword |
@@ -1344,7 +1344,7 @@ a little area for downloading appears. | |||
1344 | In the downloading area, you can select the target directory (default is | 1344 | In the downloading area, you can select the target directory (default is |
1345 | "Downloads") and specify the desired filename (by default the filename it | 1345 | "Downloads") and specify the desired filename (by default the filename it |
1346 | taken from the meta data of the published file). Additionally, you can | 1346 | taken from the meta data of the published file). Additionally, you can |
1347 | specify if the download should be anonynmous and (for directories) if | 1347 | specify if the download should be anonymous and (for directories) if |
1348 | the download should be recursive. In most cases, you can simply start | 1348 | the download should be recursive. In most cases, you can simply start |
1349 | the download with the "Download!" button. | 1349 | the download with the "Download!" button. |
1350 | 1350 | ||
@@ -1944,7 +1944,7 @@ destination. | |||
1944 | 1944 | ||
1945 | For applications that do not use DNS, you can also manually create | 1945 | For applications that do not use DNS, you can also manually create |
1946 | such a mapping using the gnunet-vpn command-line tool. Here, you | 1946 | such a mapping using the gnunet-vpn command-line tool. Here, you |
1947 | specfiy the desired address family of the result (i.e. "-4"), and the | 1947 | specify the desired address family of the result (i.e. "-4"), and the |
1948 | intended target IP on the Internet ("-i 131.159.74.67") and | 1948 | intended target IP on the Internet ("-i 131.159.74.67") and |
1949 | "gnunet-vpn" will tell you which IP address in the range of your | 1949 | "gnunet-vpn" will tell you which IP address in the range of your |
1950 | VPN tunnel was mapped. | 1950 | VPN tunnel was mapped. |
@@ -1989,7 +1989,7 @@ If you also would like to use @command{gnunet-gtk} and | |||
1989 | * Configuring the file-sharing service:: | 1989 | * Configuring the file-sharing service:: |
1990 | * Configuring logging:: | 1990 | * Configuring logging:: |
1991 | * Configuring the transport service and plugins:: | 1991 | * Configuring the transport service and plugins:: |
1992 | * Configuring the wlan transport plugin:: | 1992 | * Configuring the WLAN transport plugin:: |
1993 | * Configuring HTTP(S) reverse proxy functionality using Apache or nginx:: | 1993 | * Configuring HTTP(S) reverse proxy functionality using Apache or nginx:: |
1994 | * Blacklisting peers:: | 1994 | * Blacklisting peers:: |
1995 | * Configuration of the HTTP and HTTPS transport plugins:: | 1995 | * Configuration of the HTTP and HTTPS transport plugins:: |
@@ -2106,7 +2106,7 @@ SERVERS = http://v10.gnunet.org/hostlist [^] | |||
2106 | 2106 | ||
2107 | @noindent | 2107 | @noindent |
2108 | Besides using bootstrap servers you can configure your GNUnet peer to | 2108 | Besides using bootstrap servers you can configure your GNUnet peer to |
2109 | recieve hostlist advertisements. | 2109 | receive hostlist advertisements. |
2110 | Peers offering hostlists to other peers can send advertisement messages | 2110 | Peers offering hostlists to other peers can send advertisement messages |
2111 | to peers that connect to them. If you configure your peer to receive these | 2111 | to peers that connect to them. If you configure your peer to receive these |
2112 | messages, your peer can download these lists and connect to the peers | 2112 | messages, your peer can download these lists and connect to the peers |
@@ -2331,10 +2331,10 @@ password=$the_password_you_like | |||
2331 | 2331 | ||
2332 | @end itemize | 2332 | @end itemize |
2333 | 2333 | ||
2334 | Thats it. Note that @file{.my.cnf} file is a slight security risk unless | 2334 | That's it. Note that @file{.my.cnf} file is a slight security risk unless |
2335 | its on a safe partition. The @file{$HOME/.my.cnf} can of course be | 2335 | its on a safe partition. The @file{$HOME/.my.cnf} can of course be |
2336 | a symbolic link. | 2336 | a symbolic link. |
2337 | Luckily $USER has only priviledges to mess up GNUnet's tables, | 2337 | Luckily $USER has only privileges to mess up GNUnet's tables, |
2338 | which should be pretty harmless. | 2338 | which should be pretty harmless. |
2339 | 2339 | ||
2340 | @node Testing | 2340 | @node Testing |
@@ -2670,7 +2670,7 @@ TESTING_IGNORE_KEYS = ACCEPT_FROM; | |||
2670 | @end example | 2670 | @end example |
2671 | 2671 | ||
2672 | @noindent | 2672 | @noindent |
2673 | The server has a port configured and the maximum nunber of connections. | 2673 | The server has a port configured and the maximum number of connections. |
2674 | The HTTPS part has two files with the certificate key and the certificate | 2674 | The HTTPS part has two files with the certificate key and the certificate |
2675 | file. | 2675 | file. |
2676 | 2676 | ||
@@ -3326,7 +3326,7 @@ $ gnunet-gns-proxy | |||
3326 | @noindent | 3326 | @noindent |
3327 | Configure your browser to use this SOCKSv5 proxy on port 7777 and visit | 3327 | Configure your browser to use this SOCKSv5 proxy on port 7777 and visit |
3328 | this link. | 3328 | this link. |
3329 | If you use @command{Firefox} (or one of its deriviates/forks such as | 3329 | If you use @command{Firefox} (or one of its derivatives/forks such as |
3330 | Icecat) you also have to go to @code{about:config} and set the key | 3330 | Icecat) you also have to go to @code{about:config} and set the key |
3331 | @code{network.proxy.socks_remote_dns} to @code{true}. | 3331 | @code{network.proxy.socks_remote_dns} to @code{true}. |
3332 | 3332 | ||
@@ -3508,7 +3508,7 @@ configuration file). | |||
3508 | 3508 | ||
3509 | Some NAT boxes can be traversed using the autonomous NAT traversal method. | 3509 | Some NAT boxes can be traversed using the autonomous NAT traversal method. |
3510 | This requires certain GNUnet components to be installed with "SUID" | 3510 | This requires certain GNUnet components to be installed with "SUID" |
3511 | prividledges on your system (so if you're installing on a system you do | 3511 | privileges on your system (so if you're installing on a system you do |
3512 | not have administrative rights to, this will not work). | 3512 | not have administrative rights to, this will not work). |
3513 | If you installed as 'root', you can enable autonomous NAT traversal by | 3513 | If you installed as 'root', you can enable autonomous NAT traversal by |
3514 | checking the "Enable NAT traversal using ICMP method". | 3514 | checking the "Enable NAT traversal using ICMP method". |
@@ -3607,7 +3607,7 @@ start of @command{gnunet-gtk}). | |||
3607 | You can click on "Traffic" to see information about the amount of | 3607 | You can click on "Traffic" to see information about the amount of |
3608 | bandwidth your peer has consumed, and on "Storage" to check the amount | 3608 | bandwidth your peer has consumed, and on "Storage" to check the amount |
3609 | of storage available and used by your peer. Note that "Traffic" is | 3609 | of storage available and used by your peer. Note that "Traffic" is |
3610 | plotted cummulatively, so you should see a strict upwards trend in the | 3610 | plotted cumulatively, so you should see a strict upwards trend in the |
3611 | traffic. | 3611 | traffic. |
3612 | 3612 | ||
3613 | @node Peer Information | 3613 | @node Peer Information |
@@ -3853,7 +3853,7 @@ specific to a particular user, they probably should not run as a | |||
3853 | particular user. Also, there should typically only be one GNUnet peer per | 3853 | particular user. Also, there should typically only be one GNUnet peer per |
3854 | host. System services include the gnunet-service and gnunet-daemon | 3854 | host. System services include the gnunet-service and gnunet-daemon |
3855 | programs; support tools include command-line programs such as gnunet-arm. | 3855 | programs; support tools include command-line programs such as gnunet-arm. |
3856 | @item Priviledged helpers | 3856 | @item Privileged helpers |
3857 | Some GNUnet components require root rights to open raw sockets or perform | 3857 | Some GNUnet components require root rights to open raw sockets or perform |
3858 | other special operations. These gnunet-helper binaries are typically | 3858 | other special operations. These gnunet-helper binaries are typically |
3859 | installed SUID and run from services or daemons. | 3859 | installed SUID and run from services or daemons. |
@@ -3862,7 +3862,7 @@ Some GNUnet services (such as the DNS service) can manipulate the service | |||
3862 | in deep and possibly highly security sensitive ways. For example, the DNS | 3862 | in deep and possibly highly security sensitive ways. For example, the DNS |
3863 | service can be used to intercept and alter any DNS query originating from | 3863 | service can be used to intercept and alter any DNS query originating from |
3864 | the local machine. Access to the APIs of these critical services and their | 3864 | the local machine. Access to the APIs of these critical services and their |
3865 | priviledged helpers must be tightly controlled. | 3865 | privileged helpers must be tightly controlled. |
3866 | @end table | 3866 | @end table |
3867 | 3867 | ||
3868 | @c FIXME: The titles of these chapters are too long in the index. | 3868 | @c FIXME: The titles of these chapters are too long in the index. |
diff --git a/doc/documentation/chapters/vocabulary.texi b/doc/documentation/chapters/vocabulary.texi index 85b40b17b..0ee472b95 100644 --- a/doc/documentation/chapters/vocabulary.texi +++ b/doc/documentation/chapters/vocabulary.texi | |||
@@ -18,7 +18,7 @@ which are listed in this introductionary chapter. | |||
18 | @end menu | 18 | @end menu |
19 | 19 | ||
20 | @node Definitions | 20 | @node Definitions |
21 | @subsection Defitions | 21 | @subsection Definitions |
22 | 22 | ||
23 | Throughout this Reference Manual, the following terms and definitions | 23 | Throughout this Reference Manual, the following terms and definitions |
24 | apply. | 24 | apply. |