httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From yosh...@apache.org
Subject cvs commit: httpd-2.0/docs/manual/ssl ssl_howto.html.en ssl_howto.xml
Date Fri, 06 Aug 2004 06:59:51 GMT
yoshiki     2004/08/05 23:59:51

  Modified:    docs/manual/ssl ssl_howto.html.en ssl_howto.xml
  Log:
  Fix typo. is->it
  
  Revision  Changes    Path
  1.12      +1 -1      httpd-2.0/docs/manual/ssl/ssl_howto.html.en
  
  Index: ssl_howto.html.en
  ===================================================================
  RCS file: /home/cvs/httpd-2.0/docs/manual/ssl/ssl_howto.html.en,v
  retrieving revision 1.11
  retrieving revision 1.12
  diff -u -r1.11 -r1.12
  --- ssl_howto.html.en	21 Feb 2004 00:31:45 -0000	1.11
  +++ ssl_howto.html.en	6 Aug 2004 06:59:50 -0000	1.12
  @@ -31,7 +31,7 @@
   <p>How to solve particular security constraints for an SSL-aware
   webserver is not always obvious because of the coherences between SSL,
   HTTP and Apache's way of processing requests. This chapter gives
  -instructions on how to solve such typical situations. Treat is as a first
  +instructions on how to solve such typical situations. Treat it as a first
   step to find out the final solution, but always try to understand the 
   stuff before you use it. Nothing is worse than using a security solution
   without knowing its restrictions and coherences.</p>
  
  
  
  1.10      +2 -2      httpd-2.0/docs/manual/ssl/ssl_howto.xml
  
  Index: ssl_howto.xml
  ===================================================================
  RCS file: /home/cvs/httpd-2.0/docs/manual/ssl/ssl_howto.xml,v
  retrieving revision 1.9
  retrieving revision 1.10
  diff -u -r1.9 -r1.10
  --- ssl_howto.xml	17 Apr 2004 11:18:05 -0000	1.9
  +++ ssl_howto.xml	6 Aug 2004 06:59:50 -0000	1.10
  @@ -35,7 +35,7 @@
   <p>How to solve particular security constraints for an SSL-aware
   webserver is not always obvious because of the coherences between SSL,
   HTTP and Apache's way of processing requests. This chapter gives
  -instructions on how to solve such typical situations. Treat is as a first
  +instructions on how to solve such typical situations. Treat it as a first
   step to find out the final solution, but always try to understand the 
   stuff before you use it. Nothing is worse than using a security solution
   without knowing its restrictions and coherences.</p>
  
  
  

Mime
View raw message