[seahorse/wip/userdocs: 156/283] Changes according to Jim's suggestions.
- From: Ekaterina Gerasimova <egerasimov src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [seahorse/wip/userdocs: 156/283] Changes according to Jim's suggestions.
- Date: Sun, 16 Mar 2014 17:33:13 +0000 (UTC)
commit c4fa6a80fb34a9cbf4cb2d9b913fd9d73014b9e4
Author: Aruna Sankaranarayanan <arunasank src gnome org>
Date: Tue Aug 13 21:44:03 2013 +0530
Changes according to Jim's suggestions.
help/C/about-key-strength.page | 15 +++++++++------
help/C/about-pgp.page | 2 +-
help/C/passwords-control-access.page | 10 +++++-----
help/C/pgp-advanced-expiration-set.page | 5 ++---
help/C/pgp-expired.page | 2 +-
5 files changed, 18 insertions(+), 16 deletions(-)
---
diff --git a/help/C/about-key-strength.page b/help/C/about-key-strength.page
index af86952..be0482d 100644
--- a/help/C/about-key-strength.page
+++ b/help/C/about-key-strength.page
@@ -31,12 +31,15 @@
<p>It is difficult and more time consuming to break a strong key, but
stronger keys also slow down the encryption and signing process. You should
choose your key strength in <app>Passwords and Keys</app> depending on how
- long you want to use they key. If you are going to be using the key for a
- very short period, a small key is sufficient while stronger keys should be
- generated if you are going to use them for longer periods of time. It would
- take the average computer more than 14 billion years to crack a key that is
- 2048 bits long, thus a 2048 bit key is usually sufficient for general
- usage.</p>
+ long you want to use they key. A small key is sufficient if you are going to
+ be using it for a short period of time, but a longer key would be more secure
+ if you are going to be using it for a long period of time.</p>
+
+ <note style="tip">
+ <p>It would take the average computer more than 14 billion years to crack a
+ key that is 2048 bits long, thus a 2048 bit key is usually sufficient for
+ general usage.</p>
+ </note>
<!-- stefw: I would suggest basing this page off the current
reccomendations for key strength. The basic concepts for key
diff --git a/help/C/about-pgp.page b/help/C/about-pgp.page
index adc2267..7ec3975 100644
--- a/help/C/about-pgp.page
+++ b/help/C/about-pgp.page
@@ -5,7 +5,7 @@
<info>
<link type="guide" xref="learn-about-keys" group="first"/>
-
+ <link type="seealso" xref="about-ssh"/>
<revision version="0.1" date="2011-10-23" status="stub"/>
<revision pkgversion="3.9" version="0.1" date="2013-07-03" status="review"/>
diff --git a/help/C/passwords-control-access.page b/help/C/passwords-control-access.page
index 2605e46..ba466f8 100644
--- a/help/C/passwords-control-access.page
+++ b/help/C/passwords-control-access.page
@@ -30,8 +30,8 @@
you unlock the keyring.</p>
</item>
<item>
- <p>Protect it with a password. This requires you to type the password
- for the keyring while unlocking it.</p>
+ <p>Protect your keyring with a password. This requires you to type the
+ password for the keyring while unlocking it.</p>
</item>
</list>
@@ -43,13 +43,13 @@
<item>
<p>Right click on the selected keyring and select <gui>Lock</gui> or
click the small picture of an opened lock next to the name of the
- password keyring to lock the keyring.</p>
+ password keyring. This will lock the keyring.</p>
<note style="info">
<p>A locked keyring can be unlocked by right clicking on a selected
keyring and selecting <gui>Unlock</gui> or clicking the picture of the
closed lock next to the name of the locked keyring. If the keyring has
- been protected with a password during
- <link xref="passwords-keyring-create">keyring creation</link>, you will
+ been protected with a password when the keyring was
+ <link xref="passwords-keyring-create">created</link>, you will
be prompted to enter the password while unlocking it.</p>
</note>
</item>
diff --git a/help/C/pgp-advanced-expiration-set.page b/help/C/pgp-advanced-expiration-set.page
index ef04b60..8964e01 100644
--- a/help/C/pgp-advanced-expiration-set.page
+++ b/help/C/pgp-advanced-expiration-set.page
@@ -34,9 +34,8 @@
<p>Untick the <gui style="checkbox">Never Expires</gui> checkbox.</p>
</item>
<item>
- <p>Choose the new expiry date and time from the drop down menus
- displaying the date and time. You can also manually enter the expiry date
- and time for your key.</p>
+ <p>Choose the new expiry date and time from the drop down menus. You can
+ also manually enter the expiry date and time for your key.</p>
</item>
</steps>
diff --git a/help/C/pgp-expired.page b/help/C/pgp-expired.page
index 69f4f21..2225671 100644
--- a/help/C/pgp-expired.page
+++ b/help/C/pgp-expired.page
@@ -37,7 +37,7 @@
<p>Depending on how long you want your key to be valid, you can
<link xref="pgp-advanced-expiration-set">set an expiration date</link> for
it. By default, <app>Passwords and Keys</app> sets all keys to be valid
- forever, that is the keys never expire.</p>
+ forever. That is, the keys never expire.</p>
<p>The expiration date on a key can be
<link xref="pgp-expiration-change">changed</link> anytime, even after
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]