1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 05:01:29 +00:00

Auto regeneration with latest template files, etc.

This commit is contained in:
fyodor
2014-08-13 22:57:43 +00:00
parent 21ba1a7d24
commit f6f59a7cd7
356 changed files with 565 additions and 914 deletions

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -2,12 +2,12 @@
.\" Title: nmap-update .\" Title: nmap-update
.\" Author: [FIXME: author] [see http://docbook.sf.net/el/author] .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 04/17/2014 .\" Date: 08/13/2014
.\" Manual: nmap-update Reference Guide .\" Manual: nmap-update Reference Guide
.\" Source: nmap-update .\" Source: nmap-update
.\" Language: English .\" Language: English
.\" .\"
.TH "NMAP\-UPDATE" "1" "04/17/2014" "nmap\-update" "nmap\-update Reference Guide" .TH "NMAP\-UPDATE" "1" "08/13/2014" "nmap\-update" "nmap\-update Reference Guide"
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
.\" * Define some portability stuff .\" * Define some portability stuff
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------

View File

@@ -2,12 +2,12 @@
.\" Title: nmap .\" Title: nmap
.\" Author: [see the "Author" section] .\" Author: [see the "Author" section]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 08/12/2014 .\" Date: 08/13/2014
.\" Manual: Nmap Reference Guide .\" Manual: Nmap Reference Guide
.\" Source: Nmap .\" Source: Nmap
.\" Language: English .\" Language: English
.\" .\"
.TH "NMAP" "1" "08/12/2014" "Nmap" "Nmap Reference Guide" .TH "NMAP" "1" "08/13/2014" "Nmap" "Nmap Reference Guide"
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
.\" * Define some portability stuff .\" * Define some portability stuff
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
@@ -2595,7 +2595,7 @@ is (C) 2005\(en2012 Insecure\&.Com LLC\&. It is hereby placed under version 3\&.
\m[blue]\fBCreative Commons Attribution License\fR\m[]\&\s-2\u[19]\d\s+2\&. This allows you redistribute and modify the work as you desire, as long as you credit the original source\&. Alternatively, you may choose to treat this document as falling under the same license as Nmap itself (discussed previously)\&. \m[blue]\fBCreative Commons Attribution License\fR\m[]\&\s-2\u[19]\d\s+2\&. This allows you redistribute and modify the work as you desire, as long as you credit the original source\&. Alternatively, you may choose to treat this document as falling under the same license as Nmap itself (discussed previously)\&.
.SS "Source Code Availability and Community Contributions" .SS "Source Code Availability and Community Contributions"
.PP .PP
Source is provided to this software because we believe users have a right to know exactly what a program is going to do before they run it\&. This also allows you to audit the software for security holes (none have been found so far)\&. Source is provided to this software because we believe users have a right to know exactly what a program is going to do before they run it\&. This also allows you to audit the software for security holes\&.
.PP .PP
Source code also allows you to port Nmap to new platforms, fix bugs, and add new features\&. You are highly encouraged to send your changes to Source code also allows you to port Nmap to new platforms, fix bugs, and add new features\&. You are highly encouraged to send your changes to
<dev@nmap\&.org> <dev@nmap\&.org>

View File

@@ -2,12 +2,12 @@
.\" Title: zenmap .\" Title: zenmap
.\" Author: [see the "Authors" section] .\" Author: [see the "Authors" section]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 04/17/2014 .\" Date: 08/13/2014
.\" Manual: Zenmap Reference Guide .\" Manual: Zenmap Reference Guide
.\" Source: Zenmap .\" Source: Zenmap
.\" Language: English .\" Language: English
.\" .\"
.TH "ZENMAP" "1" "04/17/2014" "Zenmap" "Zenmap Reference Guide" .TH "ZENMAP" "1" "08/13/2014" "Zenmap" "Zenmap Reference Guide"
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
.\" * Define some portability stuff .\" * Define some portability stuff
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -100,8 +100,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -122,7 +121,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -100,8 +100,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -122,7 +121,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -120,7 +119,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/
/* This code was originally part of the Nping tool. */ /* This code was originally part of the Nping tool. */

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -99,8 +99,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -121,7 +120,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -99,8 +99,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -121,7 +120,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -100,8 +100,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -122,7 +121,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -98,8 +98,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -99,8 +99,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -121,7 +120,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -102,8 +102,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -124,7 +123,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -97,8 +97,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -119,7 +118,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -95,8 +95,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -117,7 +116,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -96,8 +96,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -118,7 +117,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -2,12 +2,12 @@
.\" Title: Ncat .\" Title: Ncat
.\" Author: [see the "Authors" section] .\" Author: [see the "Authors" section]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 04/17/2014 .\" Date: 08/13/2014
.\" Manual: Ncat Reference Guide .\" Manual: Ncat Reference Guide
.\" Source: Ncat .\" Source: Ncat
.\" Language: English .\" Language: English
.\" .\"
.TH "NCAT" "1" "04/17/2014" "Ncat" "Ncat Reference Guide" .TH "NCAT" "1" "08/13/2014" "Ncat" "Ncat Reference Guide"
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
.\" * Define some portability stuff .\" * Define some portability stuff
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

View File

@@ -93,8 +93,7 @@
* * * *
* Source is provided to this software because we believe users have a * * Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. * * right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none * * This also allows you to audit the software for security holes. *
* have been found so far). *
* * * *
* Source code also allows you to port Nmap to new platforms, fix bugs, * * Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes * * and add new features. You are highly encouraged to send your changes *
@@ -115,7 +114,7 @@
* WITHOUT ANY WARRANTY; without even the implied warranty of * * WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with * * license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) * * Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* * * *
***************************************************************************/ ***************************************************************************/

Some files were not shown because too many files have changed in this diff Show More