diff options
author | Francis Rowe <info@gluglug.org.uk> | 2015-01-29 06:33:01 (EST) |
---|---|---|
committer | Francis Rowe <info@gluglug.org.uk> | 2015-01-29 06:33:01 (EST) |
commit | 81bad75abf3cf4a97da6fe4f58a6eb0d6cd8359e (patch) | |
tree | c9a51c9c2e0465b1c72e83ebffdf6a9dee508909 /docs | |
parent | 5319c8e87e7a0545addff3da8e52036f1e15810d (diff) | |
download | libreboot-81bad75abf3cf4a97da6fe4f58a6eb0d6cd8359e.zip libreboot-81bad75abf3cf4a97da6fe4f58a6eb0d6cd8359e.tar.gz libreboot-81bad75abf3cf4a97da6fe4f58a6eb0d6cd8359e.tar.bz2 |
Documentation: fix typos.
Diffstat (limited to 'docs')
-rw-r--r-- | docs/gnulinux/configuring_parabola.html | 14 | ||||
-rw-r--r-- | docs/gnulinux/encrypted_parabola.html | 17 | ||||
-rw-r--r-- | docs/gnulinux/encrypted_trisquel.html | 6 | ||||
-rw-r--r-- | docs/release.html | 2 |
4 files changed, 19 insertions, 20 deletions
diff --git a/docs/gnulinux/configuring_parabola.html b/docs/gnulinux/configuring_parabola.html index 58addf5..0c8e92a 100644 --- a/docs/gnulinux/configuring_parabola.html +++ b/docs/gnulinux/configuring_parabola.html @@ -91,12 +91,12 @@ You do not necessarily have to follow this guide word-for-word; <i>parabola</i> is extremely flexible. The aim here is to provide a common setup that most users will be happy with. While Parabola can seem daunting at first glance (especially for new GNU/Linux users), with a simple guide it can provide - all of the same usability as Trisquel, without hiding any details from the user. + all the same usability as Trisquel, without hiding any details from the user. </p> <p> Paradoxically, as you get more advanced Parabola can actually become <i>easier to use</i> - when you want to setup your machine in a special way compared to what most distributions provide. + when you want to set up your machine in a special way compared to what most distributions provide. You will find over time that other distributions tend to <i>get in your way</i>. </p> @@ -257,7 +257,7 @@ Based on <a href="https://wiki.archlinux.org/index.php/Users_and_Groups">https://wiki.archlinux.org/index.php/Users_and_Groups</a>. </p> <p> - It is important (for security reasons) to create and use a non-root (non-admin) user account for every day use. The default 'root' account is intended + It is important (for security reasons) to create and use a non-root (non-admin) user account for everyday use. The default 'root' account is intended only for critical administrative work, since it has complete access to the entire operating system. </p> <p> @@ -336,10 +336,10 @@ I looked in /etc/tmpfiles.d/ and found that it was empty on my system. However, /usr/lib/tmpfiles.d/ contained some files. The first one was etc.conf, containing information and a reference to this manpage:<br/> # <b>man tmpfiles.d</b><br/> - Read that manpage, and then continue studying all of the files. + Read that manpage, and then continue studying all the files. </p> <p> - The systemd developers tell me that it usually isn't necessary to touch the systemd-tmpfiles utility manually at all. + The systemd developers tell me that it isn't usually necessary to touch the systemd-tmpfiles utility manually at all. </p> <p><a href="#pagetop">Back to top of page</a></p> @@ -454,10 +454,10 @@ </p> <h3 id="network_setup">Network setup</h3> <p> - I actually chose to ignore most of Networking section on the wiki. Instead, I plan to setup LXDE desktop with the graphical + I actually chose to ignore most of Networking section on the wiki. Instead, I plan to set up LXDE desktop with the graphical network-manager client. Here is a list of network managers:<br/> <a href="https://wiki.archlinux.org/index.php/List_of_applications/Internet#Network_managers">https://wiki.archlinux.org/index.php/List_of_applications/Internet#Network_managers</a>. - If you need to, set a static IP address (temporarily) using the networking guide an the Arch wiki, or start the dhcpcd service in systemd. + If you need to, set a static IP address (temporarily) using the networking guide and the Arch wiki, or start the dhcpcd service in systemd. NetworkManager will be setup later, after installing LXDE. </p> <p> diff --git a/docs/gnulinux/encrypted_parabola.html b/docs/gnulinux/encrypted_parabola.html index 7f60ebc..a48e489 100644 --- a/docs/gnulinux/encrypted_parabola.html +++ b/docs/gnulinux/encrypted_parabola.html @@ -43,7 +43,7 @@ </p> <p> - Parabola is much more flexible than Trisquel, but also more involved to setup. + Parabola is much more flexible than Trisquel, but also more involved to set up. </p> <p> @@ -78,7 +78,7 @@ If your drive was already LUKS encrypted (maybe you are re-installing your distro) then it is already 'wiped'. You should just wipe the LUKS header. <a href="https://www.lisenet.com/2013/luks-add-keys-backup-and-restore-volume-header/">https://www.lisenet.com/2013/luks-add-keys-backup-and-restore-volume-header/</a> - showed me how to do this. It recommends to do the first 3MiB. Now, that guide is recommending putting zero there. I'm doing to use urandom. Do this:<br/> + showed me how to do this. It recommends doing the first 3MiB. Now, that guide is recommending putting zero there. I'm doing to use urandom. Do this:<br/> # <b>head -c 3145728 /dev/urandom > /dev/sda; sync</b><br/> (wiping the LUKS header is important, since it has hashed passphrases and so on. It's 'secure', but 'potentially' a risk). </p> @@ -139,13 +139,12 @@ # <b>cryptsetup benchmark</b> (for making sure the list below is populated)<br/> Then:<br/> # <b>cat /proc/crypto</b><br/> - This gives me crypto options that I can use. It also provides a representation of the best way to setup LUKS (in this case, security is a priority; speed, a distant second). + This gives me crypto options that I can use. It also provides a representation of the best way to set up LUKS (in this case, security is a priority; speed, a distant second). To gain a better understanding, I am also reading:<br/> # <b>man cryptsetup</b> </p> <p> - Following that page, based on my requirements, I do the following based on - based on <a href="https://wiki.archlinux.org/index.php/Dm-crypt/Device_encryption#Encryption_options_for_LUKS_mode">https://wiki.archlinux.org/index.php/Dm-crypt/Device_encryption#Encryption_options_for_LUKS_mode</a>. + Following that page, based on my requirements, I do the following based on <a href="https://wiki.archlinux.org/index.php/Dm-crypt/Device_encryption#Encryption_options_for_LUKS_mode">https://wiki.archlinux.org/index.php/Dm-crypt/Device_encryption#Encryption_options_for_LUKS_mode</a>. Reading through, it seems like Serpent (encryption) and Whirlpool (hash) is the best option. </p> <p> @@ -184,7 +183,7 @@ # <b>lvcreate -L 2G matrix -n swapvol</b> (2G swap partition, named <u>swapvol</u>)<br/> # <b>lvcreate -l +100%FREE matrix -n rootvol</b> (single large partition in the rest of the space, named <u>rootvol</u>)<br/> You can also be flexible here, for example you can specify a /boot, a /, a /home, a /var, a /usr, etc. For example, - if you will be running a web/mail server then you want /var in it's own partition (so that if it fills up with logs, it won't crash your system). + if you will be running a web/mail server then you want /var in its own partition (so that if it fills up with logs, it won't crash your system). For a home/laptop system (typical use case), a root and a swap will do (really). </p> <p> @@ -213,7 +212,7 @@ </p> <p> Now I am following the rest of <a href="https://wiki.parabolagnulinux.org/Installation_Guide">https://wiki.parabolagnulinux.org/Installation_Guide</a>. - I also also cross referencing <a href="https://wiki.archlinux.org/index.php/Installation_guide">https://wiki.archlinux.org/index.php/Installation_guide</a>. + I also cross referenced <a href="https://wiki.archlinux.org/index.php/Installation_guide">https://wiki.archlinux.org/index.php/Installation_guide</a>. </p> <p> Create /home and /boot on rootvol mountpoint:<br/> @@ -244,7 +243,7 @@ Check there first to see if steps differ by now.<br/> Now you have to update the default Parabola keyring. This is used for signing and verifying packages:<br/> # <b>pacman -Sy parabola-keyring</b><br/> - It says that you you get GPG errors, it's probably an expired key so do:<br/> + It says that if you get GPG errors, then it's probably an expired key and, therefore, you should do:<br/> # <b>pacman-key --populate parabola</b><br/> # <b>pacman-key --refresh-keys</b><br/> # <b>pacman -Sy parabola-keyring</b><br/> @@ -352,7 +351,7 @@ </ul> </li> <li> - Now using mkinitcpio, you can create the kernel and ramdisk for booting with (note, this is different than Arch, specifying linux-libre instead of linux):<br/> + Now using mkinitcpio, you can create the kernel and ramdisk for booting with (this is different from Arch, specifying linux-libre instead of linux):<br/> # <b>mkinitcpio -p linux-libre</b><br/> Also do it for linux-libre-lts:<br/> # <b>mkinitcpio -p linux-libre-lts</b><br/> diff --git a/docs/gnulinux/encrypted_trisquel.html b/docs/gnulinux/encrypted_trisquel.html index 7f80272..8e369a4 100644 --- a/docs/gnulinux/encrypted_trisquel.html +++ b/docs/gnulinux/encrypted_trisquel.html @@ -43,7 +43,7 @@ </p> <p> - when the installer asks you to setup + when the installer asks you to set up encryption (ecryptfs) for your home directory, select 'Yes' if you want to: <b>LUKS is already secure and performs well. Having ecryptfs on top of it will add noticeable performance penalty, for little security gain in most use cases. This is therefore optional, and not recommended. Choose 'no'.</b> @@ -51,7 +51,7 @@ <p> <b> - Your user password should be different than the LUKS password which you will set later on. + Your user password should be different from the LUKS password which you will set later on. Your LUKS password should, like the user password, be secure. </b> </p> @@ -208,7 +208,7 @@ </h1> <p> - If you didn't encrypted your home directory, then you can safely ignore this section. + If you didn't encrypt your home directory, then you can safely ignore this section. </p> <p> diff --git a/docs/release.html b/docs/release.html index 5c37e50..6fce18d 100644 --- a/docs/release.html +++ b/docs/release.html @@ -344,7 +344,7 @@ Look at vortex86ex boards. See <a href="http://libreboot.org/vortex86ex">http://libreboot.org/vortex86ex</a>. </li> <li>Adapt linux-libre deblob scripts for use with coreboot. Libreboot is already deblobbed - using it's own script, but updating it is still a bit too manual. linux-libre's deblob + using its own script, but updating it is still a bit too manual. linux-libre's deblob scripts do an excellent job and (adapted) will make it much easier to maintain coreboot-libre.</li> </ul> </div> |