diff --git a/i18n/en.json b/i18n/en.json
index 16d48b6..e890d0b 100644
--- a/i18n/en.json
+++ b/i18n/en.json
@@ -325,16 +325,16 @@
"read more": "read more",
"Security": "Security",
"Security Measures": "Security Measures",
- "AlmaLinux OS Foundation provides errata to inform users about available updates, including security issues and bug fixes, and their significance through analysis. Users can easily access this information by accessing to our AlmaLinux security advisory portal, known as ": "AlmaLinux OS Foundation provides errata to inform users about available updates, including security issues and bug fixes, and their significance through analysis. Users can easily access this information by accessing to our AlmaLinux security advisory portal, known as ",
+ "AlmaLinux OS Foundation provides errata to inform users about available updates, including security issues and bug fixes, and their significance through analysis. Users can easily access this information by accessing our AlmaLinux security advisory portal, known as ": "AlmaLinux OS Foundation provides errata to inform users about available updates, including security issues and bug fixes, and their significance through analysis. Users can easily access this information by accessing our AlmaLinux security advisory portal, known as ",
"AlmaLinux Errata": "AlmaLinux Errata",
"More details on Errata and how to use it can be found on the ": "More details on Errata and how to use it can be found on the ",
- "AlmaLinux Errata wiki page": "AlmaLinux Errata wiki page",
+ "AlmaLinux Errata Wiki page": "AlmaLinux Errata Wiki page",
"Additionally, AlmaLinux OS is present in the ": "Additionally, AlmaLinux OS is present in the ",
"OSV database": "OSV database",
"Errata in JSON format for 3rd party software integration:": "Errata in JSON format for 3rd party software integration:",
"errata.full.json for AlmaLinux OS 9": "errata.full.json for AlmaLinux OS 9",
"errata.full.json for AlmaLinux OS 8": "errata.full.json for AlmaLinux OS 8",
- "AlmaLinux OS Foundation signs all of its software packages using a GPG signature key, which is verified by default when installing packages via dnf or graphical update tools. If a package is not signed or has an invalid signature, dnf or graphical update tools will warn the user.s will refuse to install it.": "AlmaLinux OS Foundation signs all of its software packages using a GPG signature key, which is verified by default when installing packages via dnf or graphical update tools. If a package is not signed or has an invalid signature, dnf or graphical update tools will warn the user.s will refuse to install it.",
+ "AlmaLinux OS Foundation signs all of its software packages using a GPG signature key, which is verified by default when installing packages via dnf or graphical update tools. If a package is not signed or has an invalid signature, dnf or graphical update tools will warn the user and will refuse to install it.": "AlmaLinux OS Foundation signs all of its software packages using a GPG signature key, which is verified by default when installing packages via dnf or graphical update tools. If a package is not signed or has an invalid signature, dnf or graphical update tools will warn the user and will refuse to install it.",
"It’s recommended to verify the signature of a package before you install it.": "It’s recommended to verify the signature of a package before you install it.",
"Location:": "Location:",
"Download:": "Download:",
diff --git a/layouts/security/single.html b/layouts/security/single.html
index 4e9210b..6c64831 100644
--- a/layouts/security/single.html
+++ b/layouts/security/single.html
@@ -27,16 +27,16 @@
{{ i18n "AlmaLinux OS Foundation provides errata to inform users about available updates, including security issues and bug fixes, and their significance through analysis. Users can easily access this information by accessing our AlmaLinux security advisory portal, known as " }}{{ i18n "AlmaLinux Errata" }}. {{ i18n "More details on Errata and how to use it can be found on the " }}{{ i18n "AlmaLinux Errata Wiki page" }}. {{ i18n "Additionally, AlmaLinux OS is present in the " }}{{ i18n "OSV database" }}.
- {{ i18n "Errata in JSON format for 3rd party software integration:" }}
-
- {{ i18n "AlmaLinux OS Foundation signs all of its software packages using a GPG signature key, which is verified by default when installing packages via dnf or graphical update tools. If a package is not signed or has an invalid signature, dnf or graphical update tools will warn the user.s will refuse to install it." }}
+ {{ i18n "AlmaLinux OS Foundation signs all of its software packages using a GPG signature key, which is verified by default when installing packages via dnf or graphical update tools. If a package is not signed or has an invalid signature, dnf or graphical update tools will warn the user and will refuse to install it." }}
{{ i18n "It’s recommended to verify the signature of a package before you install it." }}
- {{ i18n "To receive security updates and errata, users can sign up for the " }}{{ i18n "AlmaLinux Security Mailing List" }}. {{ i18n "Subscribing to the list will allow users to stay informed and updated on any security fixes as soon as they are available." }}
+ {{ i18n "To receive security updates and errata, users can sign up for the " }}
+ {{ i18n "AlmaLinux Security Mailing List" }}.
+ {{ i18n "Subscribing to the list will allow users to stay informed and updated on any security fixes as soon as they are available." }}
@@ -97,19 +102,19 @@
- {{ i18n "The Security Content Automation Protocol (SCAP) automates vulnerability management, measurement, and policy compliance evaluation of systems. AlmaLinux OS offers an OpenSCAP Guide that instructs on how to use the OpenSCAP and SCAP Workbench to audit your AlmaLinux system security compliance." }}
+ {{ i18n "The Security Content Automation Protocol (SCAP) automates vulnerability management, measurement, and policy compliance evaluation of systems. AlmaLinux OS offers an OpenSCAP Guide that instructs on how to use the OpenSCAP and SCAP Workbench to audit your AlmaLinux system security compliance." }}
{{ i18n "AlmaLinux OS also has the availability of the CIS Benchmark." }}
-
+
@@ -120,16 +125,17 @@
{{ i18n "The Open Vulnerability and Assessment Language (OVAL), offers publicly accessible security information. This includes AlmaLinux OS 8 and 9, which have available public OVAL streams." }}
{{ i18n "The Software Bill of Materials (SBOM) provides a comprehensive list of third-party and open-source components in a codebase, including version numbers, licensing information, and potential vulnerabilities." }}
- {{ i18n "AlmaLinux Build System has implemented SBOM into its pipeline for security purposes, such as tracing the build process, making it more secure, and reducing the risk of data corruption. " }}{{ i18n "Read more" }} {{ i18n "about SBOM and CAS integration with AlmaLinux." }}
- {{ i18n "AlmaLinux OS also provides " }}{{ i18n "AlmaLinux SBOM User Guide" }}
+ {{ i18n "AlmaLinux Build System has implemented SBOM into its pipeline for security purposes, such as tracing the build process, making it more secure, and reducing the risk of data corruption. " }}
+ {{ i18n "Read more" }}
+ {{ i18n "about SBOM and CAS integration with AlmaLinux." }}
+ {{ i18n "AlmaLinux OS also provides " }}
+ {{ i18n "AlmaLinux SBOM User Guide" }}