release-notes/devel/en_US FileSystems.xml,1.8,1.9

Karsten Wade (kwade) fedora-docs-commits at redhat.com
Tue Sep 26 10:00:36 UTC 2006


Author: kwade

Update of /cvs/docs/release-notes/devel/en_US
In directory cvs-int.fedora.redhat.com:/tmp/cvs-serv25680

Modified Files:
	FileSystems.xml 
Log Message:
XML fixes to match test3 usage.


Index: FileSystems.xml
===================================================================
RCS file: /cvs/docs/release-notes/devel/en_US/FileSystems.xml,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -r1.8 -r1.9
--- FileSystems.xml	25 Sep 2006 07:43:26 -0000	1.8
+++ FileSystems.xml	26 Sep 2006 10:00:34 -0000	1.9
@@ -10,8 +10,8 @@
   <para>
     Fedora Core 6 provides basic support for encrypted swap partitions
     and non-root file systems. To use it, add entries to
-    <code>/etc/crypttab</code> and reference the created devices in
-    <code>/etc/fstab</code>.
+    <filename>/etc/crypttab</filename> and reference the created devices in
+    <filename>/etc/fstab</filename>.
   </para>
 
   <para>
@@ -25,7 +25,7 @@
   </para>
 
   <para>
-    The following example shows an <code>/etc/crypttab</code> entry for a
+    The following example shows an <filename>/etc/crypttab</filename> entry for a
     swap partition:
   </para>
 
@@ -33,43 +33,43 @@
 ]]></screen>
 
   <para>
-    This creates an encrypted block device
-    <code>/dev/mapper/my_swap</code>, which can be referenced in
-    <code>/etc/fstab</code>. The next example shows an entry for a
-    filesystem volume:
+    This creates an encrypted block device <filename
+      class="devicefile">/dev/mapper/my_swap</filename>, which can be
+    referenced in <filename>/etc/fstab</filename>. The next example
+    shows an entry for a filesystem volume:
   </para>
 
 <screen><![CDATA[my_volume /dev/hda5 /etc/volume_key cipher=aes-cbc-essiv:sha256 
 ]]></screen>
 
   <para>
-    The <code>/etc/volume_key</code> file contains a plaintext
-    encryption key. You can also specify <code>none</code> as the key
-    file name, and the system instead asks for the encryption key during
-    boot.
+    The <filename>/etc/volume_key</filename> file contains a plaintext
+    encryption key. You can also specify <option>none</option> as the
+    key file name, and the system instead asks for the encryption key
+    during boot.
   </para>
 
   <para>
     The recommended method is to use
-    <emphasis role='strong'>LUKS</emphasis> for file system volumes:
+    <application>LUKS</application> for file system volumes:
   </para>
 
   <itemizedlist>
     <listitem>
       <para>
-        Create the encrypted volume using <code>cryptsetup
-        luksFormat</code>
+        Create the encrypted volume using <command>cryptsetup
+        luksFormat</command>
       </para>
     </listitem>
     <listitem>
       <para>
-        Add the necessary entry to <code>/etc/crypttab</code>
+        Add the necessary entry to <filename>/etc/crypttab</filename>
       </para>
     </listitem>
     <listitem>
       <para>
-        Set up the volume manually using <code>cryptsetup
-        luksOpen</code> or reboot
+        Set up the volume manually using <command>cryptsetup
+        luksOpen</command> or reboot
       </para>
     </listitem>
     <listitem>
@@ -79,7 +79,7 @@
     </listitem>
     <listitem>
       <para>
-        Set up an <code>/etc/fstab</code> entry
+        Set up an <filename>/etc/fstab</filename> entry
       </para>
     </listitem>
   </itemizedlist>




More information about the Fedora-docs-commits mailing list