From b6b159cc5eedca24d2ca0e27e230865ad2b4ad0f Mon Sep 17 00:00:00 2001 From: Chris Leick Date: Tue, 30 Oct 2018 22:32:34 +0100 Subject: Fix typos encountered while updating de translation --- doc/po/apt-doc.pot | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'doc/po/apt-doc.pot') diff --git a/doc/po/apt-doc.pot b/doc/po/apt-doc.pot index de566708a..4fabffeb0 100644 --- a/doc/po/apt-doc.pot +++ b/doc/po/apt-doc.pot @@ -565,7 +565,7 @@ msgid "" "packages currently installed on the system from the sources configured via " "&sources-list;. New packages will be installed if required to satisfy " "dependencies, but existing packages will never be removed. If an upgrade for " -"a package requires the remove of an installed package the upgrade for this " +"a package requires the removal of an installed package the upgrade for this " "package isn't performed." msgstr "" @@ -3753,7 +3753,7 @@ msgstr "" msgid "" "The Ignore-Files-Silently list can be used to specify " "which files APT should silently ignore while parsing the files in the " -"fragment directories. Per default a file which end with " +"fragment directories. Per default a file which ends with " ".disabled, ~, .bak " "or .dpkg-[a-z]+ is silently ignored. As seen in the last " "default value these patterns can use regular expression syntax." @@ -5736,7 +5736,7 @@ msgid "" "is that the communication between apt and server (or proxy) is " "encrypted. Note that the encryption does not prevent an attacker from " "knowing which server (or proxy) apt is communicating with and deeper " -"analyses can potentially still reveal which data was downloaded. If this is " +"analysis can potentially still reveal which data was downloaded. If this is " "a concern the Tor-based schemes mentioned further below might be a suitable " "alternative." msgstr "" @@ -7276,7 +7276,7 @@ msgid "" "&apt-transport-http;), which, as indicated by the appended S, is wrapped in " "an encrypted layer known as Transport Layer Security (TLS) to provide " "end-to-end encryption. A sufficiently capable attacker can still observe " -"the communication partners and deeper analyse of the encrypted communication " +"the communication partners and deeper analysis of the encrypted communication " "might still reveal important details. An overview over available " "alternative transport methods is given in &sources-list;." msgstr "" -- cgit v1.2.3