diff --git a/docs/refguide.xml b/docs/refguide.xml
index 019139334..7d6b17b23 100644
--- a/docs/refguide.xml
+++ b/docs/refguide.xml
@@ -341,7 +341,7 @@ you would expect.
to each target machine. An exception to this is that an ARP scan is
used for any targets which are on a local ethernet network.
For unprivileged Unix shell users, a SYN packet is sent
- instead of the ACK using the connect()
+ instead of the ACK using the connect
system call.unprivileged userslimitations of
These defaults are equivalent to the
options. This host discovery is
@@ -431,7 +431,7 @@ you would expect.
The option sends an ICMP echo
request and a TCP ACK packet to port 80 by default. When
executed by an unprivileged user, only a SYN packet is sent
- (using a connect() call) to port 80 on
+ (using a connect call) to port 80 on
the target. When a privileged user tries to scan targets
on a local ethernet network, ARP requests
are used unless
@@ -527,10 +527,10 @@ you would expect.
raw TCP packets.raw packets
For unprivileged users, a
workaround is automatically employedunprivileged userslimitations of
- whereby the connect() system call is initiated against each
+ whereby the connect system call is initiated against each
target port. This has
the effect of sending a SYN packet to the target host, in an
- attempt to establish a connection. If connect() returns
+ attempt to establish a connection. If connect returns
with a quick success or an ECONNREFUSED failure, the
underlying TCP stack must have received a SYN/ACK or RST and
the host is marked available. If the connection attempt
@@ -563,8 +563,8 @@ you would expect.
port as the SYN probe (80) and can also take a list of
destination ports in the same format. If an unprivileged
user tries this, or an IPv6 target is specified, the
- connect() workaround discussed previously is used. This
- workaround is imperfect because connect() is actually
+ connect workaround discussed previously is used. This
+ workaround is imperfect because connect is actually
sending a SYN packet rather than an ACK.
The reason for offering both SYN and ACK ping probes
@@ -800,7 +800,7 @@ a closed port or an echo reply from an alive host. The information
Nmap can provide is determined by the type of scan or ping. The SYN
scan and SYN ping ( and ) are very detailed, but the
TCP connect scan () is limited by the
-implementation of the connect system call. This feature is automatically enabled by
+implementation of the connect system call. This feature is automatically enabled by
the debug option
()implied by
and the results are stored in XML log files
@@ -851,7 +851,7 @@ even if this option is not specified.
and then listening for responses. Many requests (often
dozens) are performed in parallel to improve performance.
Specify this option to use your system resolver instead (one
- IP at a time via the getnameinfo() call). This is slower
+ IP at a time via the getnameinfo call). This is slower
and rarely useful unless you find a bug in the Nmap parallel
resolver (please let us know if you do). The system
resolver is always used for IPv6 scans.
@@ -1100,7 +1100,7 @@ not an option. This is the case when a user does not have raw packet
privileges or is scanning IPv6 networks. Instead of writing raw
packets as most other scan types do, Nmap asks the underlying
operating system to establish a connection with the target machine and
-port by issuing the connect() system call. This is
+port by issuing the connect system call. This is
the same high-level system call that web browsers, P2P clients, and
most other network-enabled applications use to establish a connection.
It is part of a programming interface known as the Berkeley Sockets
@@ -1109,7 +1109,7 @@ this API to obtain status information on each connection attempt.
When SYN scan is available, it is usually a better choice. Nmap
-has less control over the high level connect() call
+has less control over the high level connect call
than with raw packets, making it less efficient. The system call
completes connections to open target ports rather than performing the
half-open reset that SYN scan does. Not only does this take longer
@@ -3105,11 +3105,11 @@ compatibility feature of Nmap will cause the creation of
respectively.All of these arguments support
-strftime()-likestrftime conversions in filenames
+strftime-likestrftime conversions in filenames
conversions in the filename. %H, %M,
%S, %m, %d,
%y, and %Y are all exactly the same
-as in strftime(). %T is the same
+as in strftime. %T is the same
as %H%M%S, %R is the same as
%H%M, and %D is the same as
%m%d%y. A % followed by any other
@@ -3726,7 +3726,7 @@ overwhelming requests. Specify to only see
similar operations that usually require
root privilegesprivileged usersauthorized usersprivileged users
on Unix systems. By default Nmap quits if such operations are
- requested but geteuid() is not
+ requested but geteuid is not
zero. is useful with Linux
kernel capabilities and similar systems that may be
configured to allow unprivileged users to perform raw-packet