summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGNU Hurd wiki engine <web-hurd@gnu.org>2007-08-19 16:11:42 +0000
committerGNU Hurd wiki engine <web-hurd@gnu.org>2007-08-19 16:11:42 +0000
commit91d5e98756430ebb06810e918e276dacd7d227d8 (patch)
tree93ecb446b3cf1668b4b2ec3faca8a6bc2dd04c68
parent9fda0ee70fe6ebc29e87bab989f7a0cfcd072f27 (diff)
web commit by NealWalfield: Correct wiki names.
-rw-r--r--trust.mdwn4
1 files changed, 2 insertions, 2 deletions
diff --git a/trust.mdwn b/trust.mdwn
index fe2ca5f0..118028b8 100644
--- a/trust.mdwn
+++ b/trust.mdwn
@@ -9,7 +9,7 @@ When we say that a program trusts another, we mean that [[correctness]] of the
former depends on the cooperation of the latter. For instance, when a user runs
ssh, the user's intention is that all communication is encrypted. In this case,
the user trusts that the ssh binary respects this intent. In Unix, a program's
-[[trusted computing base]] consists not only of the kernel (and all the drivers,
+[[trusted computing base|tcb]] consists not only of the kernel (and all the drivers,
file systems and protocol stacks that it contains) but every program running
under the same UID; it is impossible to protect against
-[[destructive interference]] from programs running under the same UID.
+[[DestructiveInterference]] from programs running under the same UID.