diff options
author | B. Watson <yalhcru@gmail.com> | 2022-03-13 15:40:51 -0400 |
---|---|---|
committer | B. Watson <yalhcru@gmail.com> | 2022-03-13 15:40:51 -0400 |
commit | 37e09eaec9f6ee9ca2fbf04bb9230c8eee44e2ad (patch) | |
tree | fbe075e145d1a979913c76639f39150f0b7c1f73 /libraries/libnids | |
parent | 922c24e5e8ef4bbb924fea6d702c5cc60ed33ec9 (diff) | |
download | slackbuilds-37e09eaec9f6ee9ca2fbf04bb9230c8eee44e2ad.tar.gz |
libraries/libnids: Wrap README at 72 columns.
Signed-off-by: B. Watson <yalhcru@gmail.com>
Diffstat (limited to 'libraries/libnids')
-rw-r--r-- | libraries/libnids/README | 19 |
1 files changed, 10 insertions, 9 deletions
diff --git a/libraries/libnids/README b/libraries/libnids/README index f6a7a02943..9b2fa9d65d 100644 --- a/libraries/libnids/README +++ b/libraries/libnids/README @@ -1,9 +1,10 @@ -Libnids is an implementation of an E-component of Network Intrusion Detection -System. It emulates the IP stack of Linux 2.0.x. Libnids offers IP -defragmentation, TCP stream assembly and TCP port scan detection. The most -valuable feature of libnids is reliability. A number of tests were conducted, -which proved that libnids predicts behaviour of protected Linux hosts as -closely as possible. Libnids is highly configurable in run-time and offers a -convenient interface. Currently it compiles on Linux, *BSD and Solaris. -Using libnids, one has got a convenient access to data carried by a TCP -stream, no matter how artfully obscured by an attacker. +Libnids is an implementation of an E-component of Network Intrusion +Detection System. It emulates the IP stack of Linux 2.0.x. Libnids +offers IP defragmentation, TCP stream assembly and TCP port scan +detection. The most valuable feature of libnids is reliability. A +number of tests were conducted, which proved that libnids predicts +behaviour of protected Linux hosts as closely as possible. Libnids is +highly configurable in run-time and offers a convenient interface. +Currently it compiles on Linux, *BSD and Solaris. Using libnids, one +has got a convenient access to data carried by a TCP stream, no matter +how artfully obscured by an attacker. |