(evil) hackers -> crackers

This commit is contained in:
Martin Cracauer 1998-04-08 12:00:48 +00:00
parent 5f88ec3625
commit d6b37778e9
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=35100
2 changed files with 5 additions and 5 deletions

View File

@ -463,14 +463,14 @@ If no socket is bound to the destination port, or if the kernel
wasn't compiled with divert socket support, diverted packets are dropped.
.Sh EXAMPLES
This command adds an entry which denies all tcp packets from
.Em hacker.evil.org
.Em cracker.evil.org
to the telnet port of
.Em wolf.tambov.su
from being forwarded by the host:
.Pp
.Dl ipfw add deny tcp from hacker.evil.org to wolf.tambov.su 23
.Dl ipfw add deny tcp from cracker.evil.org to wolf.tambov.su 23
.Pp
This one disallows any connection from the entire hackers network to
This one disallows any connection from the entire crackers network to
my host:
.Pp
.Dl ipfw addf deny all from 123.45.67.0/24 to my.host.org

View File

@ -361,7 +361,7 @@ to execute
on the (non-FreeBSD) machine that this example was taken from.
.Sh SECURITY
If you automatically take your mail and pass it to a file tree patcher, you
might think you are handing the keys to your system to the hackers! Happily,
might think you are handing the keys to your system to the crackers! Happily,
the window for mischief is quite small.
.Nm ctm_rmail
is careful to write only to the directories given to it (by not believing any
@ -476,4 +476,4 @@ turn up here too. Error messages should be self explanatory.
.\" Gosh! No bugs here!
.\" This message brought to you by the Coalition for More Humour in Man Pages.
.\"
.\" $Id: ctm_rmail.1,v 1.12 1997/09/17 06:24:50 charnier Exp $
.\" $Id: ctm_rmail.1,v 1.13 1998/03/23 08:22:25 charnier Exp $