diff --git a/sbin/ipfw/ipfw.8 b/sbin/ipfw/ipfw.8 index 029daf630e21..13faaaa84871 100644 --- a/sbin/ipfw/ipfw.8 +++ b/sbin/ipfw/ipfw.8 @@ -463,14 +463,14 @@ If no socket is bound to the destination port, or if the kernel wasn't compiled with divert socket support, diverted packets are dropped. .Sh EXAMPLES This command adds an entry which denies all tcp packets from -.Em hacker.evil.org +.Em cracker.evil.org to the telnet port of .Em wolf.tambov.su from being forwarded by the host: .Pp -.Dl ipfw add deny tcp from hacker.evil.org to wolf.tambov.su 23 +.Dl ipfw add deny tcp from cracker.evil.org to wolf.tambov.su 23 .Pp -This one disallows any connection from the entire hackers network to +This one disallows any connection from the entire crackers network to my host: .Pp .Dl ipfw addf deny all from 123.45.67.0/24 to my.host.org diff --git a/usr.sbin/ctm/ctm_rmail/ctm_rmail.1 b/usr.sbin/ctm/ctm_rmail/ctm_rmail.1 index 24789276cb2d..a7d9f8e8f7c4 100644 --- a/usr.sbin/ctm/ctm_rmail/ctm_rmail.1 +++ b/usr.sbin/ctm/ctm_rmail/ctm_rmail.1 @@ -361,7 +361,7 @@ to execute on the (non-FreeBSD) machine that this example was taken from. .Sh SECURITY If you automatically take your mail and pass it to a file tree patcher, you -might think you are handing the keys to your system to the hackers! Happily, +might think you are handing the keys to your system to the crackers! Happily, the window for mischief is quite small. .Nm ctm_rmail is careful to write only to the directories given to it (by not believing any @@ -476,4 +476,4 @@ turn up here too. Error messages should be self explanatory. .\" Gosh! No bugs here! .\" This message brought to you by the Coalition for More Humour in Man Pages. .\" -.\" $Id: ctm_rmail.1,v 1.12 1997/09/17 06:24:50 charnier Exp $ +.\" $Id: ctm_rmail.1,v 1.13 1998/03/23 08:22:25 charnier Exp $