summaryrefslogtreecommitdiffstats
path: root/libraries/libnids
diff options
context:
space:
mode:
author B. Watson2022-03-13 20:40:51 +0100
committer B. Watson2022-03-13 20:40:51 +0100
commit37e09eaec9f6ee9ca2fbf04bb9230c8eee44e2ad (patch)
treefbe075e145d1a979913c76639f39150f0b7c1f73 /libraries/libnids
parent922c24e5e8ef4bbb924fea6d702c5cc60ed33ec9 (diff)
downloadslackbuilds-37e09eaec9f6ee9ca2fbf04bb9230c8eee44e2ad.tar.gz
libraries/libnids: Wrap README at 72 columns.
Signed-off-by: B. Watson <yalhcru@gmail.com>
Diffstat (limited to 'libraries/libnids')
-rw-r--r--libraries/libnids/README19
1 files changed, 10 insertions, 9 deletions
diff --git a/libraries/libnids/README b/libraries/libnids/README
index f6a7a02943..9b2fa9d65d 100644
--- a/libraries/libnids/README
+++ b/libraries/libnids/README
@@ -1,9 +1,10 @@
-Libnids is an implementation of an E-component of Network Intrusion Detection
-System. It emulates the IP stack of Linux 2.0.x. Libnids offers IP
-defragmentation, TCP stream assembly and TCP port scan detection. The most
-valuable feature of libnids is reliability. A number of tests were conducted,
-which proved that libnids predicts behaviour of protected Linux hosts as
-closely as possible. Libnids is highly configurable in run-time and offers a
-convenient interface. Currently it compiles on Linux, *BSD and Solaris.
-Using libnids, one has got a convenient access to data carried by a TCP
-stream, no matter how artfully obscured by an attacker.
+Libnids is an implementation of an E-component of Network Intrusion
+Detection System. It emulates the IP stack of Linux 2.0.x. Libnids
+offers IP defragmentation, TCP stream assembly and TCP port scan
+detection. The most valuable feature of libnids is reliability. A
+number of tests were conducted, which proved that libnids predicts
+behaviour of protected Linux hosts as closely as possible. Libnids is
+highly configurable in run-time and offers a convenient interface.
+Currently it compiles on Linux, *BSD and Solaris. Using libnids, one
+has got a convenient access to data carried by a TCP stream, no matter
+how artfully obscured by an attacker.