head	1.6;
access;
symbols
	RELEASE_7_4_0:1.5
	RELEASE_8_2_0:1.5
	RELEASE_6_EOL:1.5
	RELEASE_8_1_0:1.5
	RELEASE_7_3_0:1.5
	RELEASE_8_0_0:1.5
	RELEASE_7_2_0:1.5
	RELEASE_7_1_0:1.5
	RELEASE_6_4_0:1.5
	RELEASE_5_EOL:1.5
	RELEASE_7_0_0:1.5
	RELEASE_6_3_0:1.5
	PRE_XORG_7:1.5
	RELEASE_4_EOL:1.5
	RELEASE_6_2_0:1.5
	RELEASE_6_1_0:1.5
	RELEASE_5_5_0:1.5
	RELEASE_6_0_0:1.5
	RELEASE_5_4_0:1.5
	RELEASE_4_11_0:1.5
	RELEASE_5_3_0:1.5
	RELEASE_4_10_0:1.5
	RELEASE_5_2_1:1.5
	RELEASE_5_2_0:1.5
	RELEASE_4_9_0:1.5
	RELEASE_5_1_0:1.5
	RELEASE_4_8_0:1.5
	RELEASE_5_0_0:1.5
	RELEASE_4_7_0:1.5
	RELEASE_4_6_2:1.5
	RELEASE_4_6_1:1.5
	RELEASE_4_6_0:1.5
	RELEASE_5_0_DP1:1.5
	RELEASE_4_5_0:1.5
	RELEASE_4_4_0:1.4
	RELEASE_4_3_0:1.4
	RELEASE_4_2_0:1.4
	RELEASE_4_1_1:1.4
	RELEASE_4_1_0:1.4
	RELEASE_3_5_0:1.4
	RELEASE_4_0_0:1.3
	RELEASE_3_4_0:1.3
	RELEASE_3_3_0:1.3
	RELEASE_3_2_0:1.3
	RELEASE_3_1_0:1.2
	RELEASE_2_2_8:1.2
	RELEASE_3_0_0:1.2
	RELEASE_2_2_7:1.2
	RELEASE_2_2_6:1.2
	RELEASE_2_2_5:1.1
	RELEASE_2_2_1:1.1
	RELEASE_2_2_2:1.1;
locks; strict;
comment	@# @;


1.6
date	2011.09.30.09.12.32;	author dougb;	state dead;
branches;
next	1.5;

1.5
date	2001.11.20.23.29.34;	author lioux;	state Exp;
branches;
next	1.4;

1.4
date	2000.05.29.06.17.54;	author will;	state Exp;
branches;
next	1.3;

1.3
date	99.04.22.00.17.18;	author scrappy;	state Exp;
branches;
next	1.2;

1.2
date	98.02.16.15.39.50;	author markm;	state Exp;
branches;
next	1.1;

1.1
date	95.07.08.00.28.35;	author ache;	state Exp;
branches;
next	;


desc
@@


1.6
log
@As previously advertised, delete ports that have
vulnerabilities listed in portaudit, and those
that depend on them - part 1

math/mupad
	Relies on xpm, vulnerable since 2004-09-15
net-p2p/torrentflux
	Vulnerable since 2006-10-07
net/tptest
	Vulnerable since 2009-12-17
security/pgp6
	Vulnerable since 2005-07-31
www/p5-RTx-RightsMatrix
	Only works with www/rt36, which is FORBIDDEN
www/p5-RTx-Shredder
	Only works with www/rt36, which is FORBIDDEN
www/p5-RTx-Statistics
	Only works with www/rt36, which is FORBIDDEN
www/plone
	Vulnerable since 2011-02-10
www/pyblosxom
	Vulnerable since 2009-02-11
www/rt36
	Vulnerable since 2009-12-09
www/zope-archetypes
	Depends on www/plone, which is FORBIDDEN
www/zope-calendaring
	Depends on www/plone, which is FORBIDDEN
www/zope-coreblog2
	Depends on www/plone, which is FORBIDDEN
www/zope-i18nlayer
	Depends on www/plone, which is FORBIDDEN
www/zope-plonelanguagetool
	Depends on www/plone, which is FORBIDDEN
www/zope-simpleblog
	Depends on www/plone, which is FORBIDDEN
@
text
@This version of PGP combines many of the new features of PGP 5.0 with
the command line interface of PGP 2.6.x.

I ported this in an effort to get the newer code working under FreeBSD.  
The port is fairly straightforward, but my main focus was being able to build
a functioning executable.  Also, this is a port of beta code.  It seems to
work just fine, but keep in mind that it is a beta.

More information on this port can be found at:
http://www.fate.com/projects/pgpport/

WWW: http://www.pgpi.org/
@


1.5
log
@Style police: WWW tags should either end in a file/script or TRAILING /; Fix the later case
@
text
@@


1.4
log
@Update to PGP (International version) 6.5.1i.  This is actually a new
port, repo-copied from security/pgp5 by asami.

I added a bunch of the intl mirrors to make this port super-available.

PR:		16377
Submitted by:	Mike Sherwood <mike@@fate.com>
@
text
@d12 1
a12 1
WWW: http://www.pgpi.org
@


1.3
log
@this should finish cleaning up the WWW_SITE -> DESCR/WWW: mess ...
@
text
@d1 2
a2 1
This is PGP 5.0, a significant step forward from 2.6.*
d4 4
a7 1
CHANGES:
d9 2
a10 4
There are a number of large changes from the 2.6.2 distribution.  Most
notable is that the command line has changed substantially.  See
the pgp(1) man page for a discussion of how to use the new command
line.
d12 1
a12 11
Also, to allow easy interoperation with older versions on the same
system, a number of filename changes have been made.

NEW FEATURES:

PGP 5.0 contains support for new encryption methods (most notably
DSS/Diffie-Hellman), and built-in keyserver support.  Also, the
command line has been redesigned to be more Unix and scripting
friendly.

WWW: http://www.pgpi.com
@


1.2
log
@PGP v5.0i (international version). I cannot get the USA code, so if
you NA.Citizens want to make a USA version, please go ahead and frob this
port. :-)
@
text
@d19 2
@


1.1
log
@Make common pkg directory to satisfy 'make index'
@
text
@d1 18
a18 7
PGP (Pretty Good Privacy) is a public key encryption pack-
age to protect E-mail and data files.  It lets you  commu-
nicate  securely  with  people  you've  never met, with no
secure channels needed for prior exchange of  keys.   It's
well featured and fast, with sophisticated key management,
digital signatures, data compression, and  good  ergonomic
design.
@
