<listitem><para><literal>Mirror network compromise</literal>.
Without signature checking, a malicious agent can compromise a
- mirror host and modify the files in it to propage malicious
+ mirror host and modify the files in it to propagate malicious
software to all users downloading packages from that
host.</para></listitem>
</itemizedlist>
<refsect1><title>Manpage Authors</title>
-<para>This man-page is based on the work of Javier Fernandez-Sanguino
-Pena, Isaac Jones, Colin Walters, Florian Weimer and Michael Vogt.
+<para>This man-page is based on the work of Javier Fernández-Sanguino
+Peña, Isaac Jones, Colin Walters, Florian Weimer and Michael Vogt.
</para>
</refsect1>