aboutsummaryrefslogtreecommitdiff
path: root/zh_CN.GB2312/books/handbook/mac
diff options
context:
space:
mode:
authorXin LI <delphij@FreeBSD.org>2006-03-15 19:38:56 +0000
committerXin LI <delphij@FreeBSD.org>2006-03-15 19:38:56 +0000
commitb99e83b0a7c48690c2e6b7699bbd549e9a2c8da1 (patch)
tree61578f2c24f19d8d92ac0907829272ba8ae92e3e /zh_CN.GB2312/books/handbook/mac
parentf266a6a31f7f22bbb73de28eccf694ca3317afaa (diff)
Notes
Diffstat (limited to 'zh_CN.GB2312/books/handbook/mac')
-rw-r--r--zh_CN.GB2312/books/handbook/mac/chapter.sgml12
1 files changed, 6 insertions, 6 deletions
diff --git a/zh_CN.GB2312/books/handbook/mac/chapter.sgml b/zh_CN.GB2312/books/handbook/mac/chapter.sgml
index ab8d101f97..251c19c16c 100644
--- a/zh_CN.GB2312/books/handbook/mac/chapter.sgml
+++ b/zh_CN.GB2312/books/handbook/mac/chapter.sgml
@@ -2,7 +2,7 @@
The FreeBSD Documentation Project
The FreeBSD Simplified Chinese Project
- Original Revision: 1.47
+ Original Revision: 1.49
$FreeBSD$
-->
@@ -1039,7 +1039,7 @@ test: biba/high</screen>
&man.login.conf.5; 上执行 &man.cap.mkdb.1; 之后,
用户才能够切换到新的分级。</para>
- <para><username>root</username> 用户也应出现在某个登录级中;
+ <para><username>root</username> 用户名也应出现在某个登录级中;
否则, <username>root</username> 执行每一个命令的时候,
都需要使用 <command>setpmac</command>。</para>
@@ -1491,7 +1491,7 @@ mac_partition_load="YES"</programlisting>
否则这些用户将被禁止使用类似 &man.vi.1; 这样的命令。
下面的 <command>sh</command> 脚本应能完成这个工作:</para>
- <screen>&prompt.root; <userinput>for x in `awk -F: '($3 >= 1001) && ($3 != 65534) { print $1 }' \</userinput>
+ <screen>&prompt.root; <userinput>for x in `awk -F: '($3 &gt;= 1001) &amp;&amp; ($3 != 65534) { print $1 }' \</userinput>
<userinput>/etc/passwd`; do pw usermod $x -L insecure; done;</userinput></screen>
<para>改完后, 需要在 <filename>/etc/master.passwd</filename> 上运行
@@ -1661,7 +1661,7 @@ round-trip min/avg/max/stddev = 204.455/204.455/204.455/0.000 ms</screen>
test1: biba/equal,mls/equal
&prompt.root; <userinput>setfmac biba/low test1 test2; setfmac biba/high test4 test5; \
setfmac mls/low test1 test3; setfmac mls/high test2 test4</userinput>
-&prompt.root; <userinput>setfmac mls/equal,biba/equal test3 && getfmac test?</userinput>
+&prompt.root; <userinput>setfmac mls/equal,biba/equal test3 &amp;&amp; getfmac test?</userinput>
test1: biba/low,mls/low
test2: biba/low,mls/high
test3: biba/equal,mls/equal
@@ -1688,7 +1688,7 @@ test3 test5</screen>
因此, 很显然读操作应该被拒绝。
现在测试一下写操作:</para>
- <screen>&prompt.user; <userinput>for i in `echo test*`; do echo 1 > $i; done</userinput>
+ <screen>&prompt.user; <userinput>for i in `echo test*`; do echo 1 &gt; $i; done</userinput>
-su: test1: Permission denied
-su: test4: Permission denied
-su: test5: Permission denied</screen>
@@ -1744,7 +1744,7 @@ cat: test4: Permission denied</screen>
<para>现在每个用户都需要放到 default class 中;
类似下面的命令:</para>
- <screen>&prompt.root; <userinput>for x in `awk -F: '($3 >= 1001) && ($3 != 65534) { print $1 }' \</userinput>
+ <screen>&prompt.root; <userinput>for x in `awk -F: '($3 &gt;= 1001) &amp;&amp; ($3 != 65534) { print $1 }' \</userinput>
<userinput>/etc/passwd`; do pw usermod $x -L default; done;</userinput></screen>
<para>可以很快地完成这个工作。</para>