You are viewing a plain text version of this content. The canonical link for it is here.
Posted to docs@httpd.apache.org by js...@apache.org on 2003/06/07 08:56:42 UTC

cvs commit: httpd-docs-1.3/htdocs/manual/vhosts virtual-host.html

jsl         2003/06/06 23:56:41

  Modified:    htdocs/manual cygwin.html dns-caveats.html.en suexec.html.en
                        urlmapping.html
               htdocs/manual/vhosts virtual-host.html
  Log:
  Bunch of corrections (yes, I'm on a readability binge today ;))
  
  Revision  Changes    Path
  1.15      +7 -7      httpd-docs-1.3/htdocs/manual/cygwin.html
  
  Index: cygwin.html
  ===================================================================
  RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/cygwin.html,v
  retrieving revision 1.14
  retrieving revision 1.15
  diff -u -r1.14 -r1.15
  --- cygwin.html	13 May 2003 07:17:24 -0000	1.14
  +++ cygwin.html	7 Jun 2003 06:56:41 -0000	1.15
  @@ -163,7 +163,7 @@
       <p><strong>What are the differences in the configuration
       files?</strong><br />
        While the Apache for Windows port uses Windows native path
  -    names to refer files and directorys, like</p>
  +    names to refer files and directories, like</p>
   <pre>
     # httpd.conf (for Windows)
     DocumentRoot "c:/apache/htdocs"
  @@ -195,7 +195,7 @@
   
       <p>Cygwin 1.x is required to compile and run this version.
       Cygwin 1.3.9 and 1.3.10 have been tested and approved on both
  -    supported OSes. We suggest to use Cygwin 1.3.9-2 and higher.</p> 
  +    supported OSes. We suggest using Cygwin 1.3.9-2 and higher.</p> 
   
       <p><strong>Note:</strong>If you want to compile shared DLL
       modules using <a
  @@ -269,7 +269,7 @@
   </pre>
   
           <p>This will produce the required extra libraries or object
  -        files which hold all static linked code. Then
  +        files that hold all static linked code. Then
           <code>dllwrap</code> and <code>dlltool</code> will export
           all of those (including any additional module code) to the
           shared <code>cyghttpd.dll</code> and create the
  @@ -324,11 +324,11 @@
               trying to link the shared DLL modules
               <code>mod_foo.dll</code>.</p>
   
  -            <p>Unfortunatly while Apache's build process the shared
  +            <p>Unfortunately, during Apache's build process, the shared
               modules are linked before the shared core import
               library <code>src/cyghttpd.dll</code> has been made.
               The shared modules depend on this import library, so
  -            they can not link for the first time you run
  +            they cannot link for the first time you run
               <code>make</code>.</p>
             </li>
   
  @@ -344,8 +344,8 @@
               <p>All shared modules are placed into
               <code>libexec</code>, including the shared core DLL
               <code>cyghttpd.dll</code>. When Apache's
  -            <code>/bin/httpd</code> is started it has to dynamicly
  -            link <code>cyghttpd.dll</code> while runtime. That is
  +            <code>/bin/httpd</code> is started, it has to dynamically
  +            link <code>cyghttpd.dll</code> during runtime; that is
               why you have to place the shared core DLL
               <code>cyghttpd.dll</code> to the same directory where
               <code>httpd.exe</code> resides, i.e.
  
  
  
  1.14      +1 -1      httpd-docs-1.3/htdocs/manual/dns-caveats.html.en
  
  Index: dns-caveats.html.en
  ===================================================================
  RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/dns-caveats.html.en,v
  retrieving revision 1.13
  retrieving revision 1.14
  diff -u -r1.13 -r1.14
  --- dns-caveats.html.en	2 Oct 2001 11:02:58 -0000	1.13
  +++ dns-caveats.html.en	7 Jun 2003 06:56:41 -0000	1.14
  @@ -190,7 +190,7 @@
   
       <p>A possible work around to the theft of service attack
       described above would be to perform a reverse DNS lookup on the
  -    ip address returned by the forward lookup and compare the two
  +    IP address returned by the forward lookup and compare the two
       names. In the event of a mismatch the virtualhost would be
       disabled. This would require reverse DNS to be configured
       properly (which is something that most admins are familiar with
  
  
  
  1.27      +1 -1      httpd-docs-1.3/htdocs/manual/suexec.html.en
  
  Index: suexec.html.en
  ===================================================================
  RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/suexec.html.en,v
  retrieving revision 1.26
  retrieving revision 1.27
  diff -u -r1.26 -r1.27
  --- suexec.html.en	13 May 2003 07:44:58 -0000	1.26
  +++ suexec.html.en	7 Jun 2003 06:56:41 -0000	1.27
  @@ -342,7 +342,7 @@
         </li>
       </ol>
   
  -    <p align="LEFT">This is the standard operation of the the
  +    <p align="LEFT">This is the standard operation of the
       suEXEC wrapper's security model. It is somewhat stringent and
       can impose new limitations and guidelines for CGI/SSI design,
       but it was developed carefully step-by-step with security in
  
  
  
  1.8       +2 -2      httpd-docs-1.3/htdocs/manual/urlmapping.html
  
  Index: urlmapping.html
  ===================================================================
  RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/urlmapping.html,v
  retrieving revision 1.7
  retrieving revision 1.8
  diff -u -r1.7 -r1.8
  --- urlmapping.html	2 Feb 2003 22:14:45 -0000	1.7
  +++ urlmapping.html	7 Jun 2003 06:56:41 -0000	1.8
  @@ -86,7 +86,7 @@
       href="mod/core.html#documentroot">DocumentRoot</a> specified in
       your configuration files. Therefore, the files and directories
       underneath the <code>DocumentRoot</code> make up the basic
  -    document tree which will be visible from the web.</p>
  +    document tree that will be visible from the web.</p>
   
       <p>Apache is also capable of <a href="vhosts/">Virtual
       Hosting</a>, where the server receives requests for more than
  @@ -277,7 +277,7 @@
       <p>An especially useful feature of mod_speling, is that it will
       compare filenames without respect to case. This can help
       systems where users are unaware of the case-sensitive nature of
  -    URLs and the unix filesystem. But using mod_speling for
  +    URLs and the Unix filesystem. But using mod_speling for
       anything more than the occasional URL correction can place
       additional load on the server, since each "incorrect" request
       is followed by a URL redirection and a new request from the
  
  
  
  1.11      +1 -1      httpd-docs-1.3/htdocs/manual/vhosts/virtual-host.html
  
  Index: virtual-host.html
  ===================================================================
  RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/vhosts/virtual-host.html,v
  retrieving revision 1.10
  retrieving revision 1.11
  diff -u -r1.10 -r1.11
  --- virtual-host.html	8 Oct 2001 01:37:37 -0000	1.10
  +++ virtual-host.html	7 Jun 2003 06:56:41 -0000	1.11
  @@ -50,7 +50,7 @@
       <blockquote>
         http://www.smallco.com/
       </blockquote>
  -    and baygroup's home page would would have the URL 
  +    and baygroup's home page would have the URL 
   
       <blockquote>
         http://www.baygroup.org/
  
  
  

---------------------------------------------------------------------
To unsubscribe, e-mail: docs-unsubscribe@httpd.apache.org
For additional commands, e-mail: docs-help@httpd.apache.org