From 46162f4b9d7b0567da0caf25c1f6a796e3ef9ed8 Mon Sep 17 00:00:00 2001 From: Michael Haro Date: Mon, 3 May 1999 04:04:46 +0000 Subject: Add WWW: to DESCR files --- security/bjorb/pkg-descr | 4 ++-- security/checkpassword/pkg-descr | 3 ++- security/fakebo/pkg-descr | 2 +- security/gnupg/pkg-descr | 4 ++-- security/gnupg1/pkg-descr | 4 ++-- security/gtkportscan/pkg-descr | 6 ++---- security/krb5-16/pkg-descr | 2 +- security/krb5-17/pkg-descr | 2 +- security/krb5-appl/pkg-descr | 2 +- security/krb5/pkg-descr | 2 +- security/l0pht-watch/pkg-descr | 2 +- security/libparanoia/pkg-descr | 2 +- security/nmap/pkg-descr | 7 ++++--- security/nmapfe/pkg-descr | 7 ++++--- security/portscanner/pkg-descr | 2 +- security/portsentry/pkg-descr | 2 +- security/skip/pkg-descr | 1 + security/ssh2/pkg-descr | 2 +- security/zenmap/pkg-descr | 7 ++++--- 19 files changed, 33 insertions(+), 30 deletions(-) (limited to 'security') diff --git a/security/bjorb/pkg-descr b/security/bjorb/pkg-descr index 482fef0aebbd..dd562c192def 100644 --- a/security/bjorb/pkg-descr +++ b/security/bjorb/pkg-descr @@ -7,5 +7,5 @@ Features: 3. Server side certification. 4. Client side certification. -Bjorb is written by Kenkichi Mahara and bjorb -Web page is available at: http://www.hitachi-ms.co.jp/bjorb/ +Bjorb is written by Kenkichi Mahara +WWW: http://www.hitachi-ms.co.jp/bjorb/ diff --git a/security/checkpassword/pkg-descr b/security/checkpassword/pkg-descr index 5782bf793e71..379b461f07fb 100644 --- a/security/checkpassword/pkg-descr +++ b/security/checkpassword/pkg-descr @@ -1,4 +1,5 @@ Checkpassword provides a simple, uniform password-checking interface to all root applications. It is suitable for use by applications such as login, ftpd, and pop3d. - + +WWW: ftp://koobera.math.uic.edu/www/checkpwd.html diff --git a/security/fakebo/pkg-descr b/security/fakebo/pkg-descr index 5c274eed7ecc..0cb026601161 100644 --- a/security/fakebo/pkg-descr +++ b/security/fakebo/pkg-descr @@ -4,4 +4,4 @@ attempted commands and packets, as well as providing configurable responses. Useful for catching script kiddies trying to find a hackable windows box, for providing evidence to their sysadmin, etc. -http://yi.com/home/KosturjakVlatko/fakebo.htm +WWW: http://yi.com/home/KosturjakVlatko/fakebo.htm diff --git a/security/gnupg/pkg-descr b/security/gnupg/pkg-descr index e7acec0a3e83..4cb256d428a2 100644 --- a/security/gnupg/pkg-descr +++ b/security/gnupg/pkg-descr @@ -3,6 +3,6 @@ GNUPG is a complete and free replacement for PGP. Because it does not use IDEA or RSA it can be used without any restrictions. GNUPG is nearly in complicance with the OpenPGP draft. -See http://www.d.shuttle.de/isil/gnupg/ for details. --- +WWW: http://www.d.shuttle.de/isil/gnupg/ + kuriyama@FreeBSD.ORG diff --git a/security/gnupg1/pkg-descr b/security/gnupg1/pkg-descr index e7acec0a3e83..4cb256d428a2 100644 --- a/security/gnupg1/pkg-descr +++ b/security/gnupg1/pkg-descr @@ -3,6 +3,6 @@ GNUPG is a complete and free replacement for PGP. Because it does not use IDEA or RSA it can be used without any restrictions. GNUPG is nearly in complicance with the OpenPGP draft. -See http://www.d.shuttle.de/isil/gnupg/ for details. --- +WWW: http://www.d.shuttle.de/isil/gnupg/ + kuriyama@FreeBSD.ORG diff --git a/security/gtkportscan/pkg-descr b/security/gtkportscan/pkg-descr index f619b67c3921..3cf5fd565f2a 100644 --- a/security/gtkportscan/pkg-descr +++ b/security/gtkportscan/pkg-descr @@ -2,10 +2,8 @@ A simple port scanner written in Gtk+. It does simple scanning and printing of the open ports on the machine you are scanning. Includes a command-line and GUI port scanner. -Homepage: -http://www.calpoly.edu/~rbarrero/gtkportscan.html -Author: -Rafael Barrero, Jr. +WWW: http://www.calpoly.edu/~rbarrero/gtkportscan.html +Author: Rafael Barrero, Jr. -Chris Piazza cpiazza@home.net diff --git a/security/krb5-16/pkg-descr b/security/krb5-16/pkg-descr index bf3f1dca51f9..376a48c52faf 100644 --- a/security/krb5-16/pkg-descr +++ b/security/krb5-16/pkg-descr @@ -1,5 +1,5 @@ Kerberos V5 is an authentication system developed at MIT. -See also: http://web.mit.edu/kerberos/www/ +WWW: http://web.mit.edu/kerberos/www/ Abridged from the User Guide: Under Kerberos, a client sends a request for a ticket to the diff --git a/security/krb5-17/pkg-descr b/security/krb5-17/pkg-descr index bf3f1dca51f9..376a48c52faf 100644 --- a/security/krb5-17/pkg-descr +++ b/security/krb5-17/pkg-descr @@ -1,5 +1,5 @@ Kerberos V5 is an authentication system developed at MIT. -See also: http://web.mit.edu/kerberos/www/ +WWW: http://web.mit.edu/kerberos/www/ Abridged from the User Guide: Under Kerberos, a client sends a request for a ticket to the diff --git a/security/krb5-appl/pkg-descr b/security/krb5-appl/pkg-descr index bf3f1dca51f9..376a48c52faf 100644 --- a/security/krb5-appl/pkg-descr +++ b/security/krb5-appl/pkg-descr @@ -1,5 +1,5 @@ Kerberos V5 is an authentication system developed at MIT. -See also: http://web.mit.edu/kerberos/www/ +WWW: http://web.mit.edu/kerberos/www/ Abridged from the User Guide: Under Kerberos, a client sends a request for a ticket to the diff --git a/security/krb5/pkg-descr b/security/krb5/pkg-descr index bf3f1dca51f9..376a48c52faf 100644 --- a/security/krb5/pkg-descr +++ b/security/krb5/pkg-descr @@ -1,5 +1,5 @@ Kerberos V5 is an authentication system developed at MIT. -See also: http://web.mit.edu/kerberos/www/ +WWW: http://web.mit.edu/kerberos/www/ Abridged from the User Guide: Under Kerberos, a client sends a request for a ticket to the diff --git a/security/l0pht-watch/pkg-descr b/security/l0pht-watch/pkg-descr index de4cbfc307f1..13855611b7fe 100644 --- a/security/l0pht-watch/pkg-descr +++ b/security/l0pht-watch/pkg-descr @@ -1,4 +1,4 @@ This program watches over file creations and deletions in /tmp. Use it to see how secure and predictable your favourite OS/applications are. -http://www.l0pht.com/advisories.html +WWW: http://www.l0pht.com/advisories.html diff --git a/security/libparanoia/pkg-descr b/security/libparanoia/pkg-descr index d20ec5dd7d44..57dafafd8baa 100644 --- a/security/libparanoia/pkg-descr +++ b/security/libparanoia/pkg-descr @@ -18,6 +18,6 @@ standard functions in libc (using libparanoia/copy-to-libc shell script) - in this case you'll get any application, which uses shared libc, automatically protected. -http://www.lexa.ru/snar/libparanoia/ +WWW: http://www.lexa.ru/snar/libparanoia/ -- Alexandre Snarskii . Baltika-3 is better :) diff --git a/security/nmap/pkg-descr b/security/nmap/pkg-descr index 606e9ad916ef..c591362f2eda 100644 --- a/security/nmap/pkg-descr +++ b/security/nmap/pkg-descr @@ -6,9 +6,10 @@ to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. Thus nmap incorporats virtually every scanning technique known of. -See the nmap homepage at http://www.insecure.org/nmap/index.html -And the Phrack Magazine article (Volume 7, Issue 51 September 01, 1997, -article 11 of 17) http://www.insecure.org/nmap/p51-11.txt +WWW: http://www.insecure.org/nmap/index.html + +See the webpage and the Phrack Magazine article (Volume 7, Issue 51 +September 01, 1997, article 11 of 17) http://www.insecure.org/nmap/p51-11.txt -- David obrien@cs.ucdavis.edu diff --git a/security/nmapfe/pkg-descr b/security/nmapfe/pkg-descr index 606e9ad916ef..c591362f2eda 100644 --- a/security/nmapfe/pkg-descr +++ b/security/nmapfe/pkg-descr @@ -6,9 +6,10 @@ to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. Thus nmap incorporats virtually every scanning technique known of. -See the nmap homepage at http://www.insecure.org/nmap/index.html -And the Phrack Magazine article (Volume 7, Issue 51 September 01, 1997, -article 11 of 17) http://www.insecure.org/nmap/p51-11.txt +WWW: http://www.insecure.org/nmap/index.html + +See the webpage and the Phrack Magazine article (Volume 7, Issue 51 +September 01, 1997, article 11 of 17) http://www.insecure.org/nmap/p51-11.txt -- David obrien@cs.ucdavis.edu diff --git a/security/portscanner/pkg-descr b/security/portscanner/pkg-descr index 24bfadd1fc5d..ad635343b638 100644 --- a/security/portscanner/pkg-descr +++ b/security/portscanner/pkg-descr @@ -2,6 +2,6 @@ PortScanner is a simple and easy to use TCP port scanner. It is usually used to log the running servers on a remote machine for security purposes and to help people find services. -http://www.ameth.org/~veilleux/ +WWW: http://www.ameth.org/~veilleux/ Bill Fumerola diff --git a/security/portsentry/pkg-descr b/security/portsentry/pkg-descr index 7319d803e2b5..ad34563bac77 100644 --- a/security/portsentry/pkg-descr +++ b/security/portsentry/pkg-descr @@ -4,4 +4,4 @@ a target host in real-time. There are other port scan detectors that perform similar detection of scans, but PortSentry has some unique features that may make it worth looking into -http://www.psionic.com/abacus/portsentry/ +WWW: http://www.psionic.com/abacus/portsentry/ diff --git a/security/skip/pkg-descr b/security/skip/pkg-descr index 4a1056da6be3..416f6713e7da 100644 --- a/security/skip/pkg-descr +++ b/security/skip/pkg-descr @@ -22,4 +22,5 @@ This is from http://skip.incog.com: - Scalable multicast key distribution - SKIP gateways can be configured in parallel to perform instant-failover +WWW: http://skip.incog.com/ Archie Cobbs diff --git a/security/ssh2/pkg-descr b/security/ssh2/pkg-descr index de564216cd2e..88c6003dc9ae 100644 --- a/security/ssh2/pkg-descr +++ b/security/ssh2/pkg-descr @@ -30,4 +30,4 @@ o Secure file transfer. o Tunneling and encryption of arbitrary connections. -See http://www.ssh.fi/ for more details. +WWW: http://www.ssh.fi/ diff --git a/security/zenmap/pkg-descr b/security/zenmap/pkg-descr index 606e9ad916ef..c591362f2eda 100644 --- a/security/zenmap/pkg-descr +++ b/security/zenmap/pkg-descr @@ -6,9 +6,10 @@ to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. Thus nmap incorporats virtually every scanning technique known of. -See the nmap homepage at http://www.insecure.org/nmap/index.html -And the Phrack Magazine article (Volume 7, Issue 51 September 01, 1997, -article 11 of 17) http://www.insecure.org/nmap/p51-11.txt +WWW: http://www.insecure.org/nmap/index.html + +See the webpage and the Phrack Magazine article (Volume 7, Issue 51 +September 01, 1997, article 11 of 17) http://www.insecure.org/nmap/p51-11.txt -- David obrien@cs.ucdavis.edu -- cgit v1.2.3