version 1.8, 2011/03/30 11:41:48 |
version 1.8.4.1, 2014/05/22 11:37:51 |
Line 429 In particular, it is possible to configu |
|
Line 429 In particular, it is possible to configu |
|
to automatically audit all third-party packages installed via |
to automatically audit all third-party packages installed via |
.Xr pkgsrc 7 . |
.Xr pkgsrc 7 . |
To audit for any known vulnerabilities on daily basis, set the following in |
To audit for any known vulnerabilities on daily basis, set the following in |
.Fa /etc/daily.conf : |
.Pa /etc/daily.conf : |
.Bd -literal -offset indent |
.Bd -literal -offset indent |
fetch_pkg_vulnerabilities=YES |
fetch_pkg_vulnerabilities=YES |
.Ed |
.Ed |
Line 480 the Borrowed Code Chunks Exploitation Te |
|
Line 480 the Borrowed Code Chunks Exploitation Te |
|
.Re |
.Re |
.Sh AUTHORS |
.Sh AUTHORS |
Many of the security features were pioneered by |
Many of the security features were pioneered by |
.An Elad Efrat Aq elad@NetBSD.org . |
.An Elad Efrat Aq Mt elad@NetBSD.org . |