Fix typo or mispelling.

This commit is contained in:
reed 2006-06-17 04:58:14 +00:00
parent 37bfcfc9dd
commit 5fe28dc7e5
12 changed files with 27 additions and 27 deletions

View File

@ -1,4 +1,4 @@
.\" $NetBSD: wtf.6,v 1.10 2005/06/26 10:07:23 wiz Exp $ .\" $NetBSD: wtf.6,v 1.11 2006/06/17 04:58:14 reed Exp $
.\" .\"
.\" Public Domain .\" Public Domain
.\" .\"
@ -46,7 +46,7 @@ variable.
The default acronym database may be overridden by setting the The default acronym database may be overridden by setting the
environment variable environment variable
.Ev ACRONYMDB .Ev ACRONYMDB
to the name of one or more space-seperated file names of to the name of one or more space-separated file names of
acronym databases. acronym databases.
The files must be in the proper format (acronym[tab]meaning). The files must be in the proper format (acronym[tab]meaning).
.El .El

View File

@ -30,7 +30,7 @@
.\" SUCH DAMAGE. .\" SUCH DAMAGE.
.\" .\"
.\" from: @(#)strftime.3 5.12 (Berkeley) 6/29/91 .\" from: @(#)strftime.3 5.12 (Berkeley) 6/29/91
.\" $NetBSD: strftime.3,v 1.22 2004/04/14 21:59:39 kleink Exp $ .\" $NetBSD: strftime.3,v 1.23 2006/06/17 04:58:14 reed Exp $
.\" .\"
.Dd April 14, 2004 .Dd April 14, 2004
.Dt STRFTIME 3 .Dt STRFTIME 3
@ -145,7 +145,7 @@ using AM/PM notation.
.It Cm \&%S .It Cm \&%S
is replaced by the second as a decimal number [00,61]. is replaced by the second as a decimal number [00,61].
The range of The range of
seconds is (00-61) instead of (00-59) to allow for the periodic occurance seconds is (00-61) instead of (00-59) to allow for the periodic occurrence
of leap seconds and double leap seconds. of leap seconds and double leap seconds.
.It Cm %s .It Cm %s
is replaced by the number of seconds since the Epoch, UTC (see is replaced by the number of seconds since the Epoch, UTC (see

View File

@ -1,4 +1,4 @@
.\" $NetBSD: cec.4,v 1.2 2003/07/04 08:32:07 wiz Exp $ .\" $NetBSD: cec.4,v 1.3 2006/06/17 04:58:14 reed Exp $
.\" .\"
.\" Copyright (c) 2003 The NetBSD Foundation, Inc. .\" Copyright (c) 2003 The NetBSD Foundation, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -63,7 +63,7 @@ available reasonably easily:
.It .It
HAMEG HO-80 IEEE488 board HAMEG HO-80 IEEE488 board
.It .It
National Instrumemnts PCII board National Instruments PCII board
.It .It
Measurement Computing (Computer Boards) ISA GPIB boards Measurement Computing (Computer Boards) ISA GPIB boards
.El .El

View File

@ -1,4 +1,4 @@
.\" $NetBSD: sl.4,v 1.10 2004/12/05 13:27:26 wiz Exp $ .\" $NetBSD: sl.4,v 1.11 2006/06/17 04:58:14 reed Exp $
.\" .\"
.\" Copyright (c) 1983, 1991, 1993 .\" Copyright (c) 1983, 1991, 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -66,7 +66,7 @@ carriage of additional protocols (e.g.
and is not designed for synchronous serial links. and is not designed for synchronous serial links.
This is why This is why
.Tn SLIP .Tn SLIP
has been superceded by the Point-to-Point Protocol has been superseded by the Point-to-Point Protocol
.Pq Tn PPP , .Pq Tn PPP ,
which does all of those things, and much more. which does all of those things, and much more.
.Sh DIAGNOSTICS .Sh DIAGNOSTICS

View File

@ -1,4 +1,4 @@
.\" $NetBSD: stf.4,v 1.20 2004/03/24 12:09:21 wiz Exp $ .\" $NetBSD: stf.4,v 1.21 2006/06/17 04:58:14 reed Exp $
.\" $KAME: stf.4,v 1.39 2002/11/17 19:34:02 itojun Exp $ .\" $KAME: stf.4,v 1.39 2002/11/17 19:34:02 itojun Exp $
.\" .\"
.\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. .\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
@ -117,14 +117,14 @@ See
for details. for details.
.Pp .Pp
Please note that the 6to4 specification is written as an Please note that the 6to4 specification is written as an
.Dq accept tunnelled packet from everyone .Dq accept tunneled packet from everyone
tunnelling device. tunneling device.
By enabling the By enabling the
.Nm .Nm
device, you are making it much easier for malicious parties to inject device, you are making it much easier for malicious parties to inject
fabricated IPv6 packets to your node. fabricated IPv6 packets to your node.
Also, malicious parties can inject IPv6 packets with fabricated source addresses Also, malicious parties can inject IPv6 packets with fabricated source addresses
to make your node generate improper tunnelled packets. to make your node generate improper tunneled packets.
Administrators must be cautious when enabling the interface. Administrators must be cautious when enabling the interface.
To prevent possible attacks, the To prevent possible attacks, the
.Nm .Nm

View File

@ -1,4 +1,4 @@
.\" $NetBSD: tlp.4,v 1.23 2006/03/26 15:49:24 wiz Exp $ .\" $NetBSD: tlp.4,v 1.24 2006/06/17 04:58:14 reed Exp $
.\" .\"
.\" Copyright (c) 1999-2006 The NetBSD Foundation, Inc. .\" Copyright (c) 1999-2006 The NetBSD Foundation, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -403,14 +403,14 @@ Refer to those manual pages for more information.
.Re .Re
.Rs .Rs
.%T "DECchip 21140 PCI Fast Ethernet LAN Controller Hardware Reference Manual" .%T "DECchip 21140 PCI Fast Ethernet LAN Controller Hardware Reference Manual"
.%N Supercedes EC-Q0CA-TE .%N Supersedes EC-Q0CA-TE
.%D May 1995 .%D May 1995
.%A Digital Equipment Corporation .%A Digital Equipment Corporation
.%O Order Number EC-Q0CB-TE .%O Order Number EC-Q0CB-TE
.Re .Re
.Rs .Rs
.%T "DECchip 21140A PCI Fast Ethernet LAN Controller Hardware Reference Manual" .%T "DECchip 21140A PCI Fast Ethernet LAN Controller Hardware Reference Manual"
.%N Supercedes EC-QN7NA-TE, EC-QN7NB-TE .%N Supersedes EC-QN7NA-TE, EC-QN7NB-TE
.%D January 1996 .%D January 1996
.%A Digital Equipment Corporation .%A Digital Equipment Corporation
.%O Order Number EC-QN7NC-TE .%O Order Number EC-QN7NC-TE

View File

@ -1,4 +1,4 @@
.\" $NetBSD: login.conf.5,v 1.18 2005/04/13 20:39:05 drochner Exp $ .\" $NetBSD: login.conf.5,v 1.19 2006/06/17 04:58:14 reed Exp $
.\" .\"
.\" Copyright (c) 1995,1996,1997 Berkeley Software Design, Inc. .\" Copyright (c) 1995,1996,1997 Berkeley Software Design, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -109,7 +109,7 @@ Maximum file size limit.
.It Sy host.allow Ta string Ta "" Ta .It Sy host.allow Ta string Ta "" Ta
A comma-separated list of host name or IP address patterns A comma-separated list of host name or IP address patterns
from which a class is allowed access. from which a class is allowed access.
Access is instead denied from any hosts preceeded Access is instead denied from any hosts preceded
by by
.Sq Li \&! . .Sq Li \&! .
Patterns can contain the Patterns can contain the

View File

@ -1,4 +1,4 @@
.\" $NetBSD: release.7,v 1.20 2005/06/20 13:25:25 peter Exp $ .\" $NetBSD: release.7,v 1.21 2006/06/17 04:58:15 reed Exp $
.\" .\"
.\" Copyright (c) 1997, 2000, 2005 The NetBSD Foundation, Inc. .\" Copyright (c) 1997, 2000, 2005 The NetBSD Foundation, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -77,7 +77,7 @@ There may also be a
.Sy README .Sy README
file at the top-level, file at the top-level,
describing who built the snapshot and under what circumstances describing who built the snapshot and under what circumstances
.Po e.g. whether it's an offical .Po e.g. whether it's an official
.Nx .Nx
snapshot, or not snapshot, or not
.Pc . .Pc .

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ioctl.9,v 1.20 2003/05/01 08:42:08 uebayasi Exp $ .\" $NetBSD: ioctl.9,v 1.21 2006/06/17 04:58:15 reed Exp $
.\" .\"
.\" Copyright (c) 1999 The NetBSD Foundation, Inc. .\" Copyright (c) 1999 The NetBSD Foundation, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -289,7 +289,7 @@ is provided.
.Cm EPASSTHROUGH .Cm EPASSTHROUGH
indicates that no error occurred during processing (it did not fail), indicates that no error occurred during processing (it did not fail),
but neither was anything processed (it did not succeed). but neither was anything processed (it did not succeed).
This supercedes the use of either This supersedes the use of either
.Cm ENOTTY .Cm ENOTTY
(which is an explicit failure) or -1 (which has no contextual meaning) (which is an explicit failure) or -1 (which has no contextual meaning)
as a return value. as a return value.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: itimerfix.9,v 1.5 2003/04/16 13:35:29 wiz Exp $ .\" $NetBSD: itimerfix.9,v 1.6 2006/06/17 04:58:15 reed Exp $
.\" .\"
.\" Copyright (c) 2001 The NetBSD Foundation, Inc. .\" Copyright (c) 2001 The NetBSD Foundation, Inc.
.\" All rights reserved. .\" All rights reserved.
@ -55,7 +55,7 @@ total time represented is at least one
or zero. or zero.
.Pp .Pp
If the total represented time is nonzero and smaller than tick, If the total represented time is nonzero and smaller than tick,
it is adjusted to exacly one tick. it is adjusted to exactly one tick.
.Sh RETURN VALUES .Sh RETURN VALUES
.Nm .Nm
returns 0 on success or returns 0 on success or

View File

@ -1,6 +1,6 @@
.\" Copyright (c) 1988, 1989, 1991 Carnegie Mellon University .\" Copyright (c) 1988, 1989, 1991 Carnegie Mellon University
.\" .\"
.\" $NetBSD: bootpd.8,v 1.9 2002/10/29 16:12:25 wiz Exp $ .\" $NetBSD: bootpd.8,v 1.10 2006/06/17 04:58:15 reed Exp $
.\" .\"
.TH BOOTPD 8 "November 06, 1993" "Carnegie Mellon University" .TH BOOTPD 8 "November 06, 1993" "Carnegie Mellon University"
.SH NAME .SH NAME
@ -238,7 +238,7 @@ bootpc \- BOOTP Client destination port
If the port numbers cannot If the port numbers cannot
be determined using be determined using
.I getservbyname .I getservbyname
then the values default to boopts=67 and bootpc=68. then the values default to bootps=67 and bootpc=68.
.SH FILES .SH FILES
.TP 20 .TP 20
/etc/bootptab /etc/bootptab

View File

@ -26,7 +26,7 @@
.\" SUCH DAMAGE. .\" SUCH DAMAGE.
.\" .\"
.\" from: @(#)chown.8 8.3 (Berkeley) 3/31/94 .\" from: @(#)chown.8 8.3 (Berkeley) 3/31/94
.\" $NetBSD: chown.8,v 1.20 2005/12/09 20:27:02 wiz Exp $ .\" $NetBSD: chown.8,v 1.21 2006/06/17 04:58:15 reed Exp $
.\" .\"
.Dd December 9, 2005 .Dd December 9, 2005
.Dt CHOWN 8 .Dt CHOWN 8
@ -121,7 +121,7 @@ may be either a group name or a numeric group ID.
Since it is valid to have a user or group name that is numeric (and Since it is valid to have a user or group name that is numeric (and
doesn't have the numeric ID that matches its name) the name lookup doesn't have the numeric ID that matches its name) the name lookup
is always done first. is always done first.
Preceeding an ID with a ``#'' character will force it to be taken Preceding an ID with a ``#'' character will force it to be taken
as a number. as a number.
.Pp .Pp
The ownership of a file may only be altered by a super-user for The ownership of a file may only be altered by a super-user for