head	1.4;
access;
symbols
	RELEASE_6_1_0:1.3
	RELEASE_5_5_0:1.3
	RELEASE_6_0_0:1.3
	RELEASE_5_4_0:1.2
	RELEASE_4_11_0:1.2
	RELEASE_5_3_0:1.2
	RELEASE_4_10_0:1.2
	RELEASE_5_2_1:1.2
	RELEASE_5_2_0:1.2
	RELEASE_4_9_0:1.2
	RELEASE_5_1_0:1.1;
locks; strict;
comment	@# @;


1.4
date	2006.09.02.21.52.21;	author kris;	state dead;
branches;
next	1.3;

1.3
date	2005.04.07.15.03.37;	author vs;	state Exp;
branches;
next	1.2;

1.2
date	2003.06.22.09.08.32;	author erwin;	state Exp;
branches;
next	1.1;

1.1
date	2003.04.02.11.04.08;	author edwin;	state Exp;
branches;
next	;


desc
@@


1.4
log
@Remove expired ports.
@
text
@This is a threaded C class IP MySQL scanner that will attempt to login
and extract the hashes from a vulnerable MySQL daemon. See 
http://online.securityfocus.com/bid/5503 for all the details.
@


1.3
log
@Remove references to dead homepage

PR:		ports/79407
Submitted by:	maintainer
@
text
@@


1.2
log
@Website moved, fix WWW

Submitted by:	maintainer
@
text
@a3 2

WWW: http://www.fsix.net/index.php?nav=crew
@


1.1
log
@New port: security/finger_mysql - A threaded MySQL scanner

	This is a one-file-port of a threaded MySQL scanner. If the
	user "root" is passwordless, then this is even funnier. For
	some reason is segfaults if you feed it with Class B network,
	but I'll fix that when time permits.

PR:		ports/48924
Submitted by:	Yonatan@@xpert.com <Yonatan@@xpert.com>
@
text
@d5 1
a5 1
WWW: http://www.fsix.net/crew
@

