1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-20 05:09:02 +00:00

Fix a word-wrapping issue

This commit is contained in:
nnposter
2020-08-13 22:50:48 +00:00
parent ca58ae9562
commit d6877eb7b7
2 changed files with 2 additions and 4 deletions

View File

@@ -353,9 +353,7 @@ This host discovery is often sufficient when scanning local networks, but a more
.PP
The
\fB\-P*\fR
options (which select ping types) can be combined\&. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes\&. Also note that ARP/Neighbor Discovery
is done by default against targets on a local Ethernet network even if you specify other
options (which select ping types) can be combined\&. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes\&. Also note that ARP/Neighbor Discovery is done by default against targets on a local Ethernet network even if you specify other
\fB\-P*\fR
options, because it is almost always faster and more effective\&.
.PP

View File

@@ -388,7 +388,7 @@ you would expect.</para>
ping types) can be combined. You can increase your odds of
penetrating strict firewalls by sending many probe types using
different TCP ports/flags and ICMP codes. Also note that
ARP/Neighbor Discovery <indexterm><primary>ARP ping</primary></indexterm>
ARP/Neighbor Discovery<indexterm><primary>ARP ping</primary></indexterm>
is done by default against
targets on a local Ethernet network even if you specify other
<option>-P*</option> options, because it is almost always faster