path: root/en_US.ISO8859-1/books/handbook/security/chapter.xml
diff options
Diffstat (limited to 'en_US.ISO8859-1/books/handbook/security/chapter.xml')
1 files changed, 2 insertions, 2 deletions
diff --git a/en_US.ISO8859-1/books/handbook/security/chapter.xml b/en_US.ISO8859-1/books/handbook/security/chapter.xml
index 4bc3279737..d3b277a978 100644
--- a/en_US.ISO8859-1/books/handbook/security/chapter.xml
+++ b/en_US.ISO8859-1/books/handbook/security/chapter.xml
@@ -696,7 +696,7 @@ cat changed
The authentication system keeps track of the last one-time
password used, and the user is authenticated if the hash of the
user-provided password is equal to the previous password.
- Because a one-way hash is used, it is impossible to generate
+ Since a one-way hash is used, it is impossible to generate
future one-time passwords if a successfully used password is
captured. The iteration count is decremented after each
successful login to keep the user and the login program in sync.
@@ -1196,7 +1196,7 @@ sendmail : PARANOID : deny</programlisting>
<quote>trusted third party</quote> of the system. It is the
computer that issues <application>Kerberos</application>
tickets, which are used for clients to authenticate to
- servers. Because the <acronym>KDC</acronym> is considered
+ servers. As the <acronym>KDC</acronym> is considered
trusted by all other computers in the
<application>Kerberos</application> realm, it has heightened
security concerns. Direct access to the KDC should be