Ports with duplicate LATEST_LINKS

Cy Schubert Cy.Schubert at komquats.com
Tue Feb 17 12:15:46 PST 2004


In message <6.0.1.1.2.20040217204419.01e2a170 at 213.30.158.180>, Laurent 
LEVIER w
rites:
> Hi Gentlemen,
> 
> It is really a brute force attack tool to obtain passwords.
> A password cracker (as Crack, John the Ripper, ...) but oriented to work 
> over the network.
> 
> Hydra does password cracking against SMB (Windows), telnet, POP/IMAP, FTP, ..
> .
> It does dictionnary attacks as simple password generation algorithms.
> 
> I use that in my company to evaluate passwords quality when I am not 
> granted to crack the passwords directly from the box.
> If I succeed, bad point for the box owner ;-)

Should I commit the following patch to correct the wording?

Index: Makefile
===================================================================
RCS file: /home/pcvs/ports/security/hydra/Makefile,v
retrieving revision 1.6
diff -u -r1.6 Makefile
--- Makefile	15 Feb 2004 00:26:41 -0000	1.6
+++ Makefile	17 Feb 2004 20:13:27 -0000
@@ -15,7 +15,7 @@
 MASTER_SITE_SUBDIR=	groups/thc
 
 MAINTAINER=	llevier at argosnet.com
-COMMENT=	Bruce Force Attack Utility working on multiple network services
+COMMENT=	Brute force attack utility working on multiple network services
 
 NO_LATEST_LINK=	yes
 PLIST_FILES=	bin/hydra



-- 
Regards,                         Phone:  (250)387-8437
Cy Schubert                        Fax:  (250)387-5231
Team Leader, Solaris Team        Email:  Cy.Schubert at osg.gov.bc.ca
Open Systems Group, CITS
Ministry of Management Services
Province of BC            
                    FreeBSD UNIX:  cy at FreeBSD.org





More information about the freebsd-ports mailing list