(evil) hackers -> crackers
This commit is contained in:
parent
c641c2b9ee
commit
0009308669
@ -463,14 +463,14 @@ If no socket is bound to the destination port, or if the kernel
|
||||
wasn't compiled with divert socket support, diverted packets are dropped.
|
||||
.Sh EXAMPLES
|
||||
This command adds an entry which denies all tcp packets from
|
||||
.Em hacker.evil.org
|
||||
.Em cracker.evil.org
|
||||
to the telnet port of
|
||||
.Em wolf.tambov.su
|
||||
from being forwarded by the host:
|
||||
.Pp
|
||||
.Dl ipfw add deny tcp from hacker.evil.org to wolf.tambov.su 23
|
||||
.Dl ipfw add deny tcp from cracker.evil.org to wolf.tambov.su 23
|
||||
.Pp
|
||||
This one disallows any connection from the entire hackers network to
|
||||
This one disallows any connection from the entire crackers network to
|
||||
my host:
|
||||
.Pp
|
||||
.Dl ipfw addf deny all from 123.45.67.0/24 to my.host.org
|
||||
|
@ -361,7 +361,7 @@ to execute
|
||||
on the (non-FreeBSD) machine that this example was taken from.
|
||||
.Sh SECURITY
|
||||
If you automatically take your mail and pass it to a file tree patcher, you
|
||||
might think you are handing the keys to your system to the hackers! Happily,
|
||||
might think you are handing the keys to your system to the crackers! Happily,
|
||||
the window for mischief is quite small.
|
||||
.Nm ctm_rmail
|
||||
is careful to write only to the directories given to it (by not believing any
|
||||
@ -476,4 +476,4 @@ turn up here too. Error messages should be self explanatory.
|
||||
.\" Gosh! No bugs here!
|
||||
.\" This message brought to you by the Coalition for More Humour in Man Pages.
|
||||
.\"
|
||||
.\" $Id: ctm_rmail.1,v 1.12 1997/09/17 06:24:50 charnier Exp $
|
||||
.\" $Id: ctm_rmail.1,v 1.13 1998/03/23 08:22:25 charnier Exp $
|
||||
|
Loading…
x
Reference in New Issue
Block a user