From 5b477573d0bfffcec90bf5475270d9a0071835d4 Mon Sep 17 00:00:00 2001 From: "jake%bugzilla.org" <> Date: Tue, 13 May 2003 02:31:44 +0000 Subject: Bug 203314 - Clean up 's, links to bugs and extra spaces in sentences. Patch by Martin Wulffeld . r,a=jake Also, added Martin to the section about people who have made signifigant conrtibutions. --- docs/xml/installation.xml | 36 +++++++++++++++++------------------- 1 file changed, 17 insertions(+), 19 deletions(-) (limited to 'docs/xml/installation.xml') diff --git a/docs/xml/installation.xml b/docs/xml/installation.xml index 9964b88c8..142afaba7 100644 --- a/docs/xml/installation.xml +++ b/docs/xml/installation.xml @@ -44,7 +44,7 @@ - Perl + Perl (&min-perl-ver;, 5.6.1 is recommended if you wish to use Bundle::Bugzilla) @@ -209,7 +209,7 @@ MySQL Visit the MySQL homepage at - www.mysql.com + to grab and install the latest stable release of the server. @@ -257,7 +257,7 @@ Any machine that doesn't have Perl on it is a sad machine indeed. Perl can be got in source form from - perl.com for the rare + for the rare *nix systems which don't have it. Although Bugzilla runs with perl &min-perl-ver;, it's a good idea to be up to the very latest version @@ -620,7 +620,7 @@ Next, run the magic checksetup.pl script. (Many thanks to - Holger Schurig + Holger Schurig for writing this script!) This script is designed to make sure your MySQL database and other configuration options are consistent with the Bugzilla CGI files. @@ -870,10 +870,9 @@ man 5 crontab You can also try using OpenLDAP with Bugzilla, using any of a number of administration - tools. You should apply the patch attached this bug: - - http://bugzilla.mozilla.org/show_bug.cgi?id=158630, then set - the following object classes for your users: + tools. You should apply the patch attached to + bug 158630 + , then set the following object classes for your users: objectClass: person @@ -902,8 +901,7 @@ man 5 crontab incorporate the code changes necessary to fulfill the CERT advisory requirements mentioned in - http://www.cet.org/tech_tips/malicious_code_mitigation.html/#3. + url="http://www.cet.org/tech_tips/malicious_code_mitigation.html/#3"/>. Executing the following code snippet from a UNIX command shell will rectify the problem if your Bugzilla installation is intended for an English-speaking audience. As always, be sure your Bugzilla @@ -931,9 +929,9 @@ bash# perl -pi -e "s/Content-Type\: text\/html/Content-Type\: text\/html\; chars Using <meta> tags to set the charset is not recommended, as there's a bug in Netscape 4.x which causes pages - marked up in this way to load twice. See - bug - 126266 for more information including progress toward making + marked up in this way to load twice. See + bug 126266 + for more information including progress toward making bugzilla charset aware by default. @@ -1032,7 +1030,7 @@ bash# perl -pi -e "s/Content-Type\: text\/html/Content-Type\: text\/html\; chars Perl for Windows can be obtained from ActiveState. You should be able to find a compiled binary at http://aspn.activestate.com/ASPN/Downloads/ActivePerl/. + url="http://aspn.activestate.com/ASPN/Downloads/ActivePerl/"/>. @@ -1059,7 +1057,7 @@ C:\perl> ppm <module name> A complete list of modules that can be installed using ppm can - be found at http://www.activestate.com/PPMPackages/5.6plus. + be found at . @@ -1362,7 +1360,7 @@ deny from all Personal Web Server you should be able to. You will need to configure them to know how to run CGI scripts, however. This is described in Microsoft Knowledge Base article - Q245225 + Q245225 for Internet Information Services and Q231998 for Personal Web Server. @@ -1415,9 +1413,9 @@ proc filter_deny { why } { This probably doesn't account for all possible editor backup files so you may wish to add some additional variations of - localconfig. For more information, see - bug - 186383 or localconfig. For more information, see + + bug 186383 or Bugtraq ID 6501. -- cgit v1.2.3-24-g4f1b