ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-dev: [Wireshark-dev] [PATCH] trivial: typo in a comment

From: Toralf Förster <toralf.foerster@xxxxxx>
Date: Sat, 22 Mar 2014 17:05:41 +0100
Signed-off-by: Toralf Förster <toralf.foerster@xxxxxx>
---
 test/lua/dissector.lua | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/test/lua/dissector.lua b/test/lua/dissector.lua
index 632ae87..35ba4fd 100644
--- a/test/lua/dissector.lua
+++ b/test/lua/dissector.lua
@@ -28,7 +28,7 @@
 -- Once the script is loaded, it creates a new protocol named "MyDNS" (or "MYDNS" in some places).  If you have
 -- a capture file with DNS packets in it, simply select one in the Packet List pane, right-click on it, and
 -- select "Decode As ...", and then in the dialog box that shows up scroll down the list of protocols to one
--- called "MYDNS", select that and click the "ok" or "apply" button.  Voila`, your'e now decoding DNS packets
+-- called "MYDNS", select that and click the "ok" or "apply" button.  Voila`, you're now decoding DNS packets
 -- using the simplistic dissector in this script.  Another way is to download the capture file made for
 -- this script, and open that - since the DNS packets in it use UDP port 65333 (instead of the default 53),
 -- and since the MyDNS protocol in this script has been set to automatically decode UDP port 65333, it will
-- 
1.9.1