head	1.2;
access;
symbols
	RELEASE_4_10_0:1.1
	RELEASE_5_2_1:1.1
	RELEASE_5_2_0:1.1
	RELEASE_4_9_0:1.1
	RELEASE_5_1_0:1.1
	RELEASE_4_8_0:1.1
	RELEASE_5_0_0:1.1
	RELEASE_4_7_0:1.1
	RELEASE_4_6_2:1.1
	RELEASE_4_6_1:1.1
	RELEASE_4_6_0:1.1
	RELEASE_5_0_DP1:1.1
	RELEASE_4_5_0:1.1
	RELEASE_4_4_0:1.1
	RELEASE_4_3_0:1.1
	RELEASE_4_2_0:1.1
	RELEASE_4_1_1:1.1
	RELEASE_4_1_0:1.1
	RELEASE_3_5_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2004.06.20.23.40.37;	author kris;	state dead;
branches;
next	1.1;

1.1
date	2000.05.06.22.51.31;	author kris;	state Exp;
branches;
next	;


desc
@@


1.2
log
@Remove expired ports, plus the three ports that depended on them.
@
text
@--- log.c.orig	Thu May  4 12:00:00 2000
+++ log.c	Sat May  6 15:32:36 2000
@@@@ -137,7 +137,7 @@@@
   FILE *osprints;
   static char line[80], *oswin, *osttl, *osdf, *os, hexed[10];
   static int check = 0;
-  osprints = fopen("osprints.conf","r");
+  osprints = fopen(OSPRINTSCONF,"r");
 
   if(!osprints) {
     perror("Unable to find osprints.conf\n");
@


1.1
log
@Siphon-0.666 is a passive OS fingerprinter, which sniffs TCP connections
and uses characteristics of the TCP stream to guess the OS running on
the endpoints.
@
text
@@

