aboutsummaryrefslogtreecommitdiff
path: root/network/Pyrit/README
diff options
context:
space:
mode:
authorB. Watson <yalhcru@gmail.com>2022-03-13 17:29:13 -0400
committerB. Watson <yalhcru@gmail.com>2022-03-13 17:29:13 -0400
commit2b03373438d8a77168bb7f75feb7703989aca876 (patch)
treed416c5464231a1a8ff26aa7286e25733b88629b1 /network/Pyrit/README
parentd66993f6070f7453b24d380863fd983d36470c77 (diff)
network/Pyrit: Wrap README at 72 columns.
Signed-off-by: B. Watson <yalhcru@gmail.com>
Diffstat (limited to 'network/Pyrit/README')
-rw-r--r--network/Pyrit/README11
1 files changed, 6 insertions, 5 deletions
diff --git a/network/Pyrit/README b/network/Pyrit/README
index ff63c58df22c..c84cc67b072c 100644
--- a/network/Pyrit/README
+++ b/network/Pyrit/README
@@ -1,5 +1,6 @@
-Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK
-authentication phase in a space-time-tradeoff. By using the computational
-power of Multi-Core CPUs and other platforms through ATI-Stream,Nvidia CUDA
-and OpenCL, it is currently by far the most powerful attack against one of
-the world's most used security-protocols.
+Pyrit allows you to create massive databases of pre-computed
+WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using
+the computational power of Multi-Core CPUs and other platforms
+through ATI-Stream,Nvidia CUDA and OpenCL, it is currently by
+far the most powerful attack against one of the world's most used
+security-protocols.