aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--security/bjorb/pkg-descr4
-rw-r--r--security/checkpassword/pkg-descr3
-rw-r--r--security/fakebo/pkg-descr2
-rw-r--r--security/gnupg/pkg-descr4
-rw-r--r--security/gnupg1/pkg-descr4
-rw-r--r--security/gtkportscan/pkg-descr6
-rw-r--r--security/krb5-16/pkg-descr2
-rw-r--r--security/krb5-17/pkg-descr2
-rw-r--r--security/krb5-appl/pkg-descr2
-rw-r--r--security/krb5/pkg-descr2
-rw-r--r--security/l0pht-watch/pkg-descr2
-rw-r--r--security/libparanoia/pkg-descr2
-rw-r--r--security/nmap/pkg-descr7
-rw-r--r--security/nmapfe/pkg-descr7
-rw-r--r--security/portscanner/pkg-descr2
-rw-r--r--security/portsentry/pkg-descr2
-rw-r--r--security/skip/pkg-descr1
-rw-r--r--security/ssh2/pkg-descr2
-rw-r--r--security/zenmap/pkg-descr7
19 files changed, 33 insertions, 30 deletions
diff --git a/security/bjorb/pkg-descr b/security/bjorb/pkg-descr
index 482fef0aebbd..dd562c192def 100644
--- a/security/bjorb/pkg-descr
+++ b/security/bjorb/pkg-descr
@@ -7,5 +7,5 @@ Features:
3. Server side certification.
4. Client side certification.
-Bjorb is written by Kenkichi Mahara <mahara@hitachi-ms.co.jp> and bjorb
-Web page is available at: http://www.hitachi-ms.co.jp/bjorb/
+Bjorb is written by Kenkichi Mahara <mahara@hitachi-ms.co.jp>
+WWW: http://www.hitachi-ms.co.jp/bjorb/
diff --git a/security/checkpassword/pkg-descr b/security/checkpassword/pkg-descr
index 5782bf793e71..379b461f07fb 100644
--- a/security/checkpassword/pkg-descr
+++ b/security/checkpassword/pkg-descr
@@ -1,4 +1,5 @@
Checkpassword provides a simple, uniform password-checking interface
to all root applications. It is suitable for use by applications such as
login, ftpd, and pop3d.
-<URL:ftp://koobera.math.uic.edu/www/checkpwd.html>
+
+WWW: ftp://koobera.math.uic.edu/www/checkpwd.html
diff --git a/security/fakebo/pkg-descr b/security/fakebo/pkg-descr
index 5c274eed7ecc..0cb026601161 100644
--- a/security/fakebo/pkg-descr
+++ b/security/fakebo/pkg-descr
@@ -4,4 +4,4 @@ attempted commands and packets, as well as providing configurable
responses. Useful for catching script kiddies trying to find a hackable
windows box, for providing evidence to their sysadmin, etc.
-http://yi.com/home/KosturjakVlatko/fakebo.htm
+WWW: http://yi.com/home/KosturjakVlatko/fakebo.htm
diff --git a/security/gnupg/pkg-descr b/security/gnupg/pkg-descr
index e7acec0a3e83..4cb256d428a2 100644
--- a/security/gnupg/pkg-descr
+++ b/security/gnupg/pkg-descr
@@ -3,6 +3,6 @@ GNUPG is a complete and free replacement for PGP.
Because it does not use IDEA or RSA it can be used without any
restrictions. GNUPG is nearly in complicance with the OpenPGP draft.
-See http://www.d.shuttle.de/isil/gnupg/ for details.
---
+WWW: http://www.d.shuttle.de/isil/gnupg/
+
kuriyama@FreeBSD.ORG
diff --git a/security/gnupg1/pkg-descr b/security/gnupg1/pkg-descr
index e7acec0a3e83..4cb256d428a2 100644
--- a/security/gnupg1/pkg-descr
+++ b/security/gnupg1/pkg-descr
@@ -3,6 +3,6 @@ GNUPG is a complete and free replacement for PGP.
Because it does not use IDEA or RSA it can be used without any
restrictions. GNUPG is nearly in complicance with the OpenPGP draft.
-See http://www.d.shuttle.de/isil/gnupg/ for details.
---
+WWW: http://www.d.shuttle.de/isil/gnupg/
+
kuriyama@FreeBSD.ORG
diff --git a/security/gtkportscan/pkg-descr b/security/gtkportscan/pkg-descr
index f619b67c3921..3cf5fd565f2a 100644
--- a/security/gtkportscan/pkg-descr
+++ b/security/gtkportscan/pkg-descr
@@ -2,10 +2,8 @@ A simple port scanner written in Gtk+. It does simple scanning
and printing of the open ports on the machine you are scanning.
Includes a command-line and GUI port scanner.
-Homepage:
-http://www.calpoly.edu/~rbarrero/gtkportscan.html
-Author:
-Rafael Barrero, Jr. <rbarrero@polymail.calpoly.edu>
+WWW: http://www.calpoly.edu/~rbarrero/gtkportscan.html
+Author: Rafael Barrero, Jr. <rbarrero@polymail.calpoly.edu>
-Chris Piazza
cpiazza@home.net
diff --git a/security/krb5-16/pkg-descr b/security/krb5-16/pkg-descr
index bf3f1dca51f9..376a48c52faf 100644
--- a/security/krb5-16/pkg-descr
+++ b/security/krb5-16/pkg-descr
@@ -1,5 +1,5 @@
Kerberos V5 is an authentication system developed at MIT.
-See also: http://web.mit.edu/kerberos/www/
+WWW: http://web.mit.edu/kerberos/www/
Abridged from the User Guide:
Under Kerberos, a client sends a request for a ticket to the
diff --git a/security/krb5-17/pkg-descr b/security/krb5-17/pkg-descr
index bf3f1dca51f9..376a48c52faf 100644
--- a/security/krb5-17/pkg-descr
+++ b/security/krb5-17/pkg-descr
@@ -1,5 +1,5 @@
Kerberos V5 is an authentication system developed at MIT.
-See also: http://web.mit.edu/kerberos/www/
+WWW: http://web.mit.edu/kerberos/www/
Abridged from the User Guide:
Under Kerberos, a client sends a request for a ticket to the
diff --git a/security/krb5-appl/pkg-descr b/security/krb5-appl/pkg-descr
index bf3f1dca51f9..376a48c52faf 100644
--- a/security/krb5-appl/pkg-descr
+++ b/security/krb5-appl/pkg-descr
@@ -1,5 +1,5 @@
Kerberos V5 is an authentication system developed at MIT.
-See also: http://web.mit.edu/kerberos/www/
+WWW: http://web.mit.edu/kerberos/www/
Abridged from the User Guide:
Under Kerberos, a client sends a request for a ticket to the
diff --git a/security/krb5/pkg-descr b/security/krb5/pkg-descr
index bf3f1dca51f9..376a48c52faf 100644
--- a/security/krb5/pkg-descr
+++ b/security/krb5/pkg-descr
@@ -1,5 +1,5 @@
Kerberos V5 is an authentication system developed at MIT.
-See also: http://web.mit.edu/kerberos/www/
+WWW: http://web.mit.edu/kerberos/www/
Abridged from the User Guide:
Under Kerberos, a client sends a request for a ticket to the
diff --git a/security/l0pht-watch/pkg-descr b/security/l0pht-watch/pkg-descr
index de4cbfc307f1..13855611b7fe 100644
--- a/security/l0pht-watch/pkg-descr
+++ b/security/l0pht-watch/pkg-descr
@@ -1,4 +1,4 @@
This program watches over file creations and deletions in /tmp. Use it
to see how secure and predictable your favourite OS/applications are.
-http://www.l0pht.com/advisories.html
+WWW: http://www.l0pht.com/advisories.html
diff --git a/security/libparanoia/pkg-descr b/security/libparanoia/pkg-descr
index d20ec5dd7d44..57dafafd8baa 100644
--- a/security/libparanoia/pkg-descr
+++ b/security/libparanoia/pkg-descr
@@ -18,6 +18,6 @@ standard functions in libc (using libparanoia/copy-to-libc
shell script) - in this case you'll get any application,
which uses shared libc, automatically protected.
-http://www.lexa.ru/snar/libparanoia/
+WWW: http://www.lexa.ru/snar/libparanoia/
--
Alexandre Snarskii <snar@paranoia.ru>. Baltika-3 is better :)
diff --git a/security/nmap/pkg-descr b/security/nmap/pkg-descr
index 606e9ad916ef..c591362f2eda 100644
--- a/security/nmap/pkg-descr
+++ b/security/nmap/pkg-descr
@@ -6,9 +6,10 @@ to mention the fact that you may want to scan different protocols (UDP, TCP,
ICMP, etc.). You just can't do all this with one scanning mode. Thus nmap
incorporats virtually every scanning technique known of.
-See the nmap homepage at http://www.insecure.org/nmap/index.html
-And the Phrack Magazine article (Volume 7, Issue 51 September 01, 1997,
-article 11 of 17) http://www.insecure.org/nmap/p51-11.txt
+WWW: http://www.insecure.org/nmap/index.html
+
+See the webpage and the Phrack Magazine article (Volume 7, Issue 51
+September 01, 1997, article 11 of 17) http://www.insecure.org/nmap/p51-11.txt
-- David
obrien@cs.ucdavis.edu
diff --git a/security/nmapfe/pkg-descr b/security/nmapfe/pkg-descr
index 606e9ad916ef..c591362f2eda 100644
--- a/security/nmapfe/pkg-descr
+++ b/security/nmapfe/pkg-descr
@@ -6,9 +6,10 @@ to mention the fact that you may want to scan different protocols (UDP, TCP,
ICMP, etc.). You just can't do all this with one scanning mode. Thus nmap
incorporats virtually every scanning technique known of.
-See the nmap homepage at http://www.insecure.org/nmap/index.html
-And the Phrack Magazine article (Volume 7, Issue 51 September 01, 1997,
-article 11 of 17) http://www.insecure.org/nmap/p51-11.txt
+WWW: http://www.insecure.org/nmap/index.html
+
+See the webpage and the Phrack Magazine article (Volume 7, Issue 51
+September 01, 1997, article 11 of 17) http://www.insecure.org/nmap/p51-11.txt
-- David
obrien@cs.ucdavis.edu
diff --git a/security/portscanner/pkg-descr b/security/portscanner/pkg-descr
index 24bfadd1fc5d..ad635343b638 100644
--- a/security/portscanner/pkg-descr
+++ b/security/portscanner/pkg-descr
@@ -2,6 +2,6 @@ PortScanner is a simple and easy to use TCP port scanner. It is usually used to
log the running servers on a remote machine for security purposes and to help
people find services.
-http://www.ameth.org/~veilleux/
+WWW: http://www.ameth.org/~veilleux/
Bill Fumerola <billf@chc-chimes.com>
diff --git a/security/portsentry/pkg-descr b/security/portsentry/pkg-descr
index 7319d803e2b5..ad34563bac77 100644
--- a/security/portsentry/pkg-descr
+++ b/security/portsentry/pkg-descr
@@ -4,4 +4,4 @@ a target host in real-time. There are other port scan detectors that
perform similar detection of scans, but PortSentry has some unique
features that may make it worth looking into
-http://www.psionic.com/abacus/portsentry/
+WWW: http://www.psionic.com/abacus/portsentry/
diff --git a/security/skip/pkg-descr b/security/skip/pkg-descr
index 4a1056da6be3..416f6713e7da 100644
--- a/security/skip/pkg-descr
+++ b/security/skip/pkg-descr
@@ -22,4 +22,5 @@ This is from http://skip.incog.com:
- Scalable multicast key distribution
- SKIP gateways can be configured in parallel to perform instant-failover
+WWW: http://skip.incog.com/
Archie Cobbs <archie@whistle.com>
diff --git a/security/ssh2/pkg-descr b/security/ssh2/pkg-descr
index de564216cd2e..88c6003dc9ae 100644
--- a/security/ssh2/pkg-descr
+++ b/security/ssh2/pkg-descr
@@ -30,4 +30,4 @@ o Secure file transfer.
o Tunneling and encryption of arbitrary connections.
-See http://www.ssh.fi/ for more details.
+WWW: http://www.ssh.fi/
diff --git a/security/zenmap/pkg-descr b/security/zenmap/pkg-descr
index 606e9ad916ef..c591362f2eda 100644
--- a/security/zenmap/pkg-descr
+++ b/security/zenmap/pkg-descr
@@ -6,9 +6,10 @@ to mention the fact that you may want to scan different protocols (UDP, TCP,
ICMP, etc.). You just can't do all this with one scanning mode. Thus nmap
incorporats virtually every scanning technique known of.
-See the nmap homepage at http://www.insecure.org/nmap/index.html
-And the Phrack Magazine article (Volume 7, Issue 51 September 01, 1997,
-article 11 of 17) http://www.insecure.org/nmap/p51-11.txt
+WWW: http://www.insecure.org/nmap/index.html
+
+See the webpage and the Phrack Magazine article (Volume 7, Issue 51
+September 01, 1997, article 11 of 17) http://www.insecure.org/nmap/p51-11.txt
-- David
obrien@cs.ucdavis.edu