1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-29 02:49:01 +00:00

Update http urls for nmap.org to https

This commit is contained in:
dmiller
2015-11-05 20:41:05 +00:00
parent c06e50b703
commit f4619edece
722 changed files with 1345 additions and 1405 deletions

View File

@@ -2,12 +2,12 @@
.\" Title: Ncat
.\" Author: [see the "Authors" section]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 07/08/2015
.\" Date: 11/05/2015
.\" Manual: Ncat Reference Guide
.\" Source: Ncat
.\" Language: English
.\"
.TH "NCAT" "1" "07/08/2015" "Ncat" "Ncat Reference Guide"
.TH "NCAT" "1" "11/05/2015" "Ncat" "Ncat Reference Guide"
.\" -----------------------------------------------------------------
.\" * Define some portability stuff
.\" -----------------------------------------------------------------
@@ -43,7 +43,7 @@ Among Ncat\*(Aqs vast number of features there is the ability to chain Ncats tog
.RS 4
.\}
.nf
Ncat 6\&.49SVN ( http://nmap\&.org/ncat )
Ncat 6\&.49SVN ( https://nmap\&.org/ncat )
Usage: ncat [options] [hostname] [port]
Options taking a time assume seconds\&. Append \*(Aqms\*(Aq for milliseconds,
@@ -85,12 +85,6 @@ Options taking a time assume seconds\&. Append \*(Aqms\*(Aq for milliseconds,
\-\-proxy <addr[:port]> Specify address of host to proxy through
\-\-proxy\-type <type> Specify proxy type ("http" or "socks4" or "socks5")
\-\-proxy\-auth <auth> Authenticate with HTTP or SOCKS proxy server
\-\-ssl Connect or listen with SSL
\-\-ssl\-cert Specify SSL certificate file (PEM) for listening
\-\-ssl\-key Specify SSL private key (PEM) for listening
\-\-ssl\-verify Verify trust and domain name of certificates
\-\-ssl\-trustfile PEM file containing trusted SSL certificates
\-\-ssl\-ciphers Cipherlist containing SSL ciphers to use
\-\-version Display Ncat\*(Aqs version information and exit
See the ncat(1) manpage for full options, descriptions and usage examples
@@ -562,7 +556,7 @@ or
.SH "BUGS"
.PP
Like its authors, Ncat isn\*(Aqt perfect\&. But you can help make it better by sending bug reports or even writing patches\&. If Ncat doesn\*(Aqt behave the way you expect, first upgrade to the latest version available from
\m[blue]\fB\%http://nmap.org\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try Googling the error message or browsing the
\m[blue]\fB\%https://nmap.org\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try Googling the error message or browsing the
nmap\-dev
archives at
\m[blue]\fB\%http://seclists.org/\fR\m[]\&.
@@ -635,7 +629,7 @@ Netcat (or any other implementation), Ncat is most definitely based on Netcat in
.\" GNU General Public License
.PP
Ncat is (C) 2005\(en2012 Insecure\&.Com LLC\&. It is distributed as free and open source software under the same license terms as our Nmap software\&. Precise terms and further details are available
from \m[blue]\fB\%http://nmap.org/man/man-legal.html\fR\m[]\&.
from \m[blue]\fB\%https://nmap.org/man/man-legal.html\fR\m[]\&.
.SS "Creative Commons License for this Ncat Guide"
.PP
This

View File

@@ -1,4 +1,4 @@
Ncat 6.49SVN ( http://nmap.org/ncat )
Ncat 6.49SVN ( https://nmap.org/ncat )
Usage: ncat [options] [hostname] [port]
Options taking a time assume seconds. Append 'ms' for milliseconds,
@@ -40,12 +40,6 @@ Options taking a time assume seconds. Append 'ms' for milliseconds,
--proxy <addr[:port]> Specify address of host to proxy through
--proxy-type <type> Specify proxy type ("http" or "socks4" or "socks5")
--proxy-auth <auth> Authenticate with HTTP or SOCKS proxy server
--ssl Connect or listen with SSL
--ssl-cert Specify SSL certificate file (PEM) for listening
--ssl-key Specify SSL private key (PEM) for listening
--ssl-verify Verify trust and domain name of certificates
--ssl-trustfile PEM file containing trusted SSL certificates
--ssl-ciphers Cipherlist containing SSL ciphers to use
--version Display Ncat's version information and exit
See the ncat(1) manpage for full options, descriptions and usage examples

View File

@@ -936,7 +936,7 @@
it better by sending bug reports or even writing patches. If Ncat
doesn't behave the way you expect, first upgrade to the latest
version available from <ulink
url="http://nmap.org"/>. If the problem persists,
url="https://nmap.org"/>. If the problem persists,
do some research to determine whether it has already been
discovered and addressed. Try Googling the error message or
browsing the <citetitle>nmap-dev</citetitle> archives at <ulink
@@ -996,7 +996,7 @@
<para>Ncat is (C) 2005&ndash;2012 Insecure.Com LLC. It is distributed
as free and open source software under the same license terms as our
Nmap software. Precise terms and further details are available
<man>from <ulink url="http://nmap.org/man/man-legal.html"/>.</man>
<man>from <ulink url="https://nmap.org/man/man-legal.html"/>.</man>
<notman>in <xref linkend="nmap-copyright"/>.</notman></para>
</refsect2>

View File

@@ -467,7 +467,7 @@ Content-Type: text/html; charset=UTF-8
<indexterm><primary><option>--ssl</option> (Ncat option)</primary><secondary>example of</secondary></indexterm>
<screen>
$ <userinput>ncat -v --listen --ssl</userinput>
Ncat ( http://nmap.org/ncat )
Ncat ( https://nmap.org/ncat )
Generating a temporary 1024-bit RSA key. Use --ssl-key and --ssl-cert to use a <continuation/>permanent one.
SHA-1 fingerprint: F0:13:BF:FB:2D:AA:76:88:22:60:3E:17:93:29:3E:0E:6B:92:C0:2F
</screen>
@@ -835,7 +835,7 @@ Protocol mismatch.
options. Each of these takes a comma-separated list of host
specifications. The syntax is almost identical to that recognized by Nmap for
targets
(see <ulink url="http://nmap.org/book/man-target-specification.html">the section called <quote>Target Specification</quote></ulink>).
(see <ulink url="https://nmap.org/book/man-target-specification.html">the section called <quote>Target Specification</quote></ulink>).
<!-- (see <xref linkend="host-discovery-specify-targets"/>). -->
This includes IPv4 and IPv6 addresses, hostnames, IPv4 octet ranges,
and CIDR netmasks. In Ncat (unlike Nmap), CIDR netmasks are supported for IPv6
@@ -1877,7 +1877,7 @@ host1$ <userinput>ncat --send-only host2 &lt; log.txt</userinput>
<indexterm><primary><option>--script</option></primary><secondary>example of</secondary></indexterm>
<screen>
# <userinput>nmap -sSU -p 13 --script=daytime localhost</userinput>
Starting Nmap ( http://nmap.org )
Starting Nmap ( https://nmap.org )
Nmap scan report for localhost (127.0.0.1)
PORT STATE SERVICE