aboutsummaryrefslogtreecommitdiff
path: root/network
diff options
context:
space:
mode:
authorB. Watson <yalhcru@gmail.com>2022-03-14 03:16:47 -0400
committerB. Watson <yalhcru@gmail.com>2022-03-14 03:16:47 -0400
commit3150fab6115342eab612a08bbc832340ed6e6ebb (patch)
tree047003197fdcce0f5e8b2712cca2dc9684f7d35f /network
parente956fa9df8b47473edf178be6f53f1d9367e6f47 (diff)
network/psad: Wrap README at 72 columns.
Signed-off-by: B. Watson <yalhcru@gmail.com>
Diffstat (limited to 'network')
-rw-r--r--network/psad/README11
1 files changed, 6 insertions, 5 deletions
diff --git a/network/psad/README b/network/psad/README
index 190eb57fcfb6..c4490f2c0b5d 100644
--- a/network/psad/README
+++ b/network/psad/README
@@ -2,9 +2,9 @@ psad (Intrusion Detection and Log Analysis with iptables)
psad is a collection of three lightweight system daemons (two main
daemons and one helper daemon) that run on Linux machines and analyze
-iptables log messages to detect port scans and other suspicious traffic.
-A typical deployment is to run psad on the iptables firewall where it has
-the fastest access to log data.
+iptables log messages to detect port scans and other suspicious
+traffic. A typical deployment is to run psad on the iptables firewall
+where it has the fastest access to log data.
You can set email for alerts by setting ALERTSEMAIL:
@@ -44,5 +44,6 @@ on SlackBuilds.
NOTE:
The default option is NOT to download signatures.
We provide a signature file, but may be outdated as time goes by.
-You can download them manually from http://www.cipherdyne.org/psad/signatures
-and place them in /etc/psad
+You can download them manually from:
+http://www.cipherdyne.org/psad/signatures
+...and place them in /etc/psad