=back
-An installation can choose to allow any of these to be matched by changing the
-controlling lists contained in the program
-C<\$Config{privlib}>/F<unicore/mktables> and then re-running F<mktables>.
-(C<\%Config> is available from the Config module).
+An installation can choose to allow any of these to be matched by downloading
+the Unicode database from L<http://www.unicode.org/Public/> to
+C<\$Config{privlib}>/F<unicore/>, changing the controlling lists contained in
+the program C<\$Config{privlib}>/F<unicore/mktables> and then re-running
+F<mktables>. (C<\%Config> is available from the Config module).
=head1 Files in the I<To> directory (for serious hackers only)
An installation can choose to change which files are generated by changing the
controlling lists contained in the program
-C<\$Config{privlib}>/F<unicore/mktables> and then re-running F<mktables>.
+C<\$Config{privlib}>/F<unicore/mktables> and then re-running F<mktables>
+(but the Unicode database must have been downloaded from
+L<http://www.unicode.org/Public/> to C<\$Config{privlib}>F</unicore/> first).
Each of these files defines two hash entries to help reading programs decipher
it. One of them looks like this: