aboutsummaryrefslogtreecommitdiff
path: root/net-mgmt/p0f/pkg-descr
diff options
context:
space:
mode:
Diffstat (limited to 'net-mgmt/p0f/pkg-descr')
-rw-r--r--net-mgmt/p0f/pkg-descr23
1 files changed, 0 insertions, 23 deletions
diff --git a/net-mgmt/p0f/pkg-descr b/net-mgmt/p0f/pkg-descr
deleted file mode 100644
index def189dd1264..000000000000
--- a/net-mgmt/p0f/pkg-descr
+++ /dev/null
@@ -1,23 +0,0 @@
-from the README:
-
-Passive OS fingerprinting is based on information coming from a remote host
-when it establishes a connection to our system. Captured packets contain
-enough information to identify the operating system. In contrast to active
-scanners such as nmap and QueSO, p0f does not send anything to the host being
-identified.
-
-For more information, read Spitzner's text at:
-http://www.enteract.com/~lspitz/finger.html .
-
-from the maintainer:
-
-Use of this program requires read access to the packet filtering
-device, typically /dev/bpf0. Granting such access allows the users
-who have it to put your Ethernet device into promiscuous mode and
-sniff your network. See
-http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
-if you do not understand how this can be harmful. Running p0f with
-no options will cause it to analyse packets intended for other
-hosts.
-
-WWW: http://www.stearns.org/p0f/