release-notes/devel/en_US FileSystems.xml,1.13,1.14

Paul W. Frields (pfrields) fedora-docs-commits at redhat.com
Sat Sep 15 17:10:56 UTC 2007


Author: pfrields

Update of /cvs/docs/release-notes/devel/en_US
In directory cvs-int.fedora.redhat.com:/tmp/cvs-serv16768

Modified Files:
	FileSystems.xml 
Log Message:
Import changes from wiki for F8



Index: FileSystems.xml
===================================================================
RCS file: /cvs/docs/release-notes/devel/en_US/FileSystems.xml,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -r1.13 -r1.14
--- FileSystems.xml	18 May 2007 00:40:19 -0000	1.13
+++ FileSystems.xml	15 Sep 2007 17:10:54 -0000	1.14
@@ -13,7 +13,7 @@
   </tip>
 
   <para>
-    Fedora 7 provides basic support for encrypted swap partitions and
+    Fedora 8 provides basic support for encrypted swap partitions and
     non-root file systems. To use it, add entries to
     <filename>/etc/crypttab</filename> and reference the created devices in
     <filename>/etc/fstab</filename>.
@@ -37,7 +37,7 @@
 ]]></screen>
 
   <para>
-    This creates an encrypted block device
+    This command creates an encrypted block device
     <filename>/dev/mapper/my_swap</filename>, which can be referenced in
     <filename>/etc/fstab</filename>. The next example shows an entry for a
     filesystem volume:
@@ -55,35 +55,35 @@
 
   <para>
     The recommended method is to use <firstterm>LUKS</firstterm> for file system
-    volumes: (using LUKS you can drop the
-    <computeroutput>cipher=</computeroutput> part in
-    <filename>crypttab</filename>).
+    volumes.  If you are using LUKS you can drop the
+    <computeroutput>cipher=</computeroutput> declaration in
+    <filename>/etc/crypttab</filename>).
   </para>
 
   <procedure>
     <step>
       <para>
         Create the encrypted volume using <command>cryptsetup
-        luksFormat</command>
+        luksFormat</command>.
       </para>
     </step>
     <step>
       <para>
-        Add the necessary entry to <filename>/etc/crypttab</filename>
+        Add the necessary entry to <filename>/etc/crypttab</filename>.
       </para>
     </step>
     <step>
       <para>
         Set up the volume manually using <command>cryptsetup
-        luksOpen</command> or reboot
+        luksOpen</command> or reboot.
       </para>
     </step>
     <step>
-      <para>Create a filesystem on the encrypted volume</para> 
+      <para>Create a filesystem on the encrypted volume.</para> 
     </step>
     <step>
       <para>
-        Set up an <filename>/etc/fstab</filename> entry
+        Set up an entry in <filename>/etc/fstab</filename>.
       </para>
     </step>
   </procedure>




More information about the docs-commits mailing list