diff options
author | B. Watson <yalhcru@gmail.com> | 2022-03-14 03:16:47 -0400 |
---|---|---|
committer | B. Watson <yalhcru@gmail.com> | 2022-03-14 03:16:47 -0400 |
commit | 3150fab6115342eab612a08bbc832340ed6e6ebb (patch) | |
tree | 047003197fdcce0f5e8b2712cca2dc9684f7d35f /network | |
parent | e956fa9df8b47473edf178be6f53f1d9367e6f47 (diff) |
network/psad: Wrap README at 72 columns.
Signed-off-by: B. Watson <yalhcru@gmail.com>
Diffstat (limited to 'network')
-rw-r--r-- | network/psad/README | 11 |
1 files changed, 6 insertions, 5 deletions
diff --git a/network/psad/README b/network/psad/README index 190eb57fcfb6..c4490f2c0b5d 100644 --- a/network/psad/README +++ b/network/psad/README @@ -2,9 +2,9 @@ psad (Intrusion Detection and Log Analysis with iptables) psad is a collection of three lightweight system daemons (two main daemons and one helper daemon) that run on Linux machines and analyze -iptables log messages to detect port scans and other suspicious traffic. -A typical deployment is to run psad on the iptables firewall where it has -the fastest access to log data. +iptables log messages to detect port scans and other suspicious +traffic. A typical deployment is to run psad on the iptables firewall +where it has the fastest access to log data. You can set email for alerts by setting ALERTSEMAIL: @@ -44,5 +44,6 @@ on SlackBuilds. NOTE: The default option is NOT to download signatures. We provide a signature file, but may be outdated as time goes by. -You can download them manually from http://www.cipherdyne.org/psad/signatures -and place them in /etc/psad +You can download them manually from: +http://www.cipherdyne.org/psad/signatures +...and place them in /etc/psad |