aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorEitan Adler <eadler@FreeBSD.org>2012-01-08 07:01:25 +0000
committerEitan Adler <eadler@FreeBSD.org>2012-01-08 07:01:25 +0000
commitc5d811a37d56d8b50097c8e3ae91f58980ee7ed9 (patch)
tree5810e1ce97ce2cdafc8ab85ef5ee1efef73f5b58 /security
parenta03386997b05123634c4a845036ff9a7340f2c38 (diff)
downloadports-c5d811a37d56d8b50097c8e3ae91f58980ee7ed9.tar.gz
ports-c5d811a37d56d8b50097c8e3ae91f58980ee7ed9.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/arpCounterattack/pkg-descr2
-rw-r--r--security/blindelephant/pkg-descr2
-rw-r--r--security/gss/pkg-descr2
-rw-r--r--security/p5-Crypt-HCE_MD5/pkg-descr2
-rw-r--r--security/p5-Crypt-HCE_SHA/pkg-descr2
-rw-r--r--security/p5-Text-Password-Pronounceable/pkg-descr2
-rw-r--r--security/pam_ssh_agent_auth/pkg-descr2
-rw-r--r--security/py-htpasswd/pkg-descr2
-rw-r--r--security/suricata/pkg-descr2
9 files changed, 9 insertions, 9 deletions
diff --git a/security/arpCounterattack/pkg-descr b/security/arpCounterattack/pkg-descr
index 7252ac7db14e..8a166f61316f 100644
--- a/security/arpCounterattack/pkg-descr
+++ b/security/arpCounterattack/pkg-descr
@@ -3,7 +3,7 @@ monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
-interface that the attack was seen on is is configured as being in aggressive
+interface that the attack was seen on is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
diff --git a/security/blindelephant/pkg-descr b/security/blindelephant/pkg-descr
index cf115003c7dd..a39cf05b4005 100644
--- a/security/blindelephant/pkg-descr
+++ b/security/blindelephant/pkg-descr
@@ -1,7 +1,7 @@
The BlindElephant Web Application Fingerprinter attempts to discover
the version of a (known) web application by comparing static files
at known locations against precomputed hashes for versions of those
-files in all all available releases. The technique is fast,
+files in all available releases. The technique is fast,
low-bandwidth, non-invasive, generic, and highly automatable.
WWW: http://blindelephant.sourceforge.net/
diff --git a/security/gss/pkg-descr b/security/gss/pkg-descr
index 5e9d29183272..4eb2bd8a49cc 100644
--- a/security/gss/pkg-descr
+++ b/security/gss/pkg-descr
@@ -1,6 +1,6 @@
GSS is an implementation of the Generic Security Service Application Program
Interface (GSS-API). GSS-API is used by network servers (e.g., IMAP, SMTP) to
-provide security security services, e.g., authenticate clients against servers.
+provide security services, e.g., authenticate clients against servers.
GSS consists of a library and a manual.
WWW: http://www.gnu.org/software/gss/
diff --git a/security/p5-Crypt-HCE_MD5/pkg-descr b/security/p5-Crypt-HCE_MD5/pkg-descr
index ec98f2200879..828023fdb1fc 100644
--- a/security/p5-Crypt-HCE_MD5/pkg-descr
+++ b/security/p5-Crypt-HCE_MD5/pkg-descr
@@ -5,7 +5,7 @@ Cryptography.
Two interfaces are provided in the module. The first is
straight block encryption/decryption the second does base64
mime encoding/decoding of the encrypted/decrypted blocks.
-The idea is the the two sides have a shared secret that
+The idea is the two sides have a shared secret that
supplies one of the keys and a randomly generated block of
bytes provides the second key. The random key is passed in
cleartext between the two sides.
diff --git a/security/p5-Crypt-HCE_SHA/pkg-descr b/security/p5-Crypt-HCE_SHA/pkg-descr
index 0685e8fb8dd2..17d4e2486c69 100644
--- a/security/p5-Crypt-HCE_SHA/pkg-descr
+++ b/security/p5-Crypt-HCE_SHA/pkg-descr
@@ -7,7 +7,7 @@
straight block encryption/decryption the second does base64
mime encoding/decoding of the encrypted/decrypted blocks.
- The idea is the the two sides have a shared secret that
+ The idea is that the two sides have a shared secret that
supplies one of the keys and a randomly generated block of
bytes provides the second key. The random key is passed in
cleartext between the two sides.
diff --git a/security/p5-Text-Password-Pronounceable/pkg-descr b/security/p5-Text-Password-Pronounceable/pkg-descr
index d5be4388e546..6c779818e636 100644
--- a/security/p5-Text-Password-Pronounceable/pkg-descr
+++ b/security/p5-Text-Password-Pronounceable/pkg-descr
@@ -1,6 +1,6 @@
Text::Password::Pronounceable - Generate pronounceable passwords
-This module generates pronuceable passwords, based the the
+This module generates pronuceable passwords, based the
English digraphs by D Edwards.
WWW: http://search.cpan.org/dist/Text-Password-Pronounceable/
diff --git a/security/pam_ssh_agent_auth/pkg-descr b/security/pam_ssh_agent_auth/pkg-descr
index 9cabfac61a54..2daf4e2e9b74 100644
--- a/security/pam_ssh_agent_auth/pkg-descr
+++ b/security/pam_ssh_agent_auth/pkg-descr
@@ -1,5 +1,5 @@
PAM module which permits authentication for arbitrary services via
ssh-agent. Written with sudo in mind, but like any auth PAM module,
-can be used for for many purposes.
+can be used for many purposes.
WWW: http://pamsshagentauth.sourceforge.net/
diff --git a/security/py-htpasswd/pkg-descr b/security/py-htpasswd/pkg-descr
index 45616b259277..3b982d34d4c2 100644
--- a/security/py-htpasswd/pkg-descr
+++ b/security/py-htpasswd/pkg-descr
@@ -1,6 +1,6 @@
Replacement for htpasswd.
-This port will install htpasswd.py that can be found in trac trac contrib
+This port will install htpasswd.py that can be found in trac contrib
directory.
WWW: http://trac.edgewall.org/browser/trunk/contrib/htpasswd.py
diff --git a/security/suricata/pkg-descr b/security/suricata/pkg-descr
index 260cad7dc2a4..a0d4a32145cb 100644
--- a/security/suricata/pkg-descr
+++ b/security/suricata/pkg-descr
@@ -6,7 +6,7 @@ the industry, but will bring new ideas and technologies to the field.
OISF is part of and funded by the Department of Homeland Security's Directorate
for Science and Technology HOST program (Homeland Open Security Technology),
-by the the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
+by the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
through the very generous support of the members of the OISF Consortium.
More information about the Consortium is available, as well as a list of our