From d6877eb7b761df1466b5a52d1256d920ef141ca2 Mon Sep 17 00:00:00 2001 From: nnposter Date: Thu, 13 Aug 2020 22:50:48 +0000 Subject: [PATCH] Fix a word-wrapping issue --- docs/nmap.1 | 4 +--- docs/refguide.xml | 2 +- 2 files changed, 2 insertions(+), 4 deletions(-) diff --git a/docs/nmap.1 b/docs/nmap.1 index 95f9b37a2..dc4ece880 100644 --- a/docs/nmap.1 +++ b/docs/nmap.1 @@ -353,9 +353,7 @@ This host discovery is often sufficient when scanning local networks, but a more .PP The \fB\-P*\fR -options (which select ping types) can be combined\&. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes\&. Also note that ARP/Neighbor Discovery - -is done by default against targets on a local Ethernet network even if you specify other +options (which select ping types) can be combined\&. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes\&. Also note that ARP/Neighbor Discovery is done by default against targets on a local Ethernet network even if you specify other \fB\-P*\fR options, because it is almost always faster and more effective\&. .PP diff --git a/docs/refguide.xml b/docs/refguide.xml index 5378cf47d..01b454587 100644 --- a/docs/refguide.xml +++ b/docs/refguide.xml @@ -388,7 +388,7 @@ you would expect. ping types) can be combined. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes. Also note that - ARP/Neighbor Discovery ARP ping + ARP/Neighbor DiscoveryARP ping is done by default against targets on a local Ethernet network even if you specify other options, because it is almost always faster