head	1.2;
access;
symbols
	RELEASE_4_7_0:1.1
	RELEASE_4_6_2:1.1
	RELEASE_4_6_1:1.1
	RELEASE_4_6_0:1.1
	RELEASE_5_0_DP1:1.1
	RELEASE_4_5_0:1.1
	RELEASE_4_4_0:1.1
	RELEASE_4_3_0:1.1
	RELEASE_4_2_0:1.1
	RELEASE_4_1_1:1.1
	RELEASE_4_1_0:1.1
	RELEASE_3_5_0:1.1
	RELEASE_4_0_0:1.1
	RELEASE_3_4_0:1.1
	RELEASE_3_3_0:1.1
	RELEASE_3_2_0:1.1
	RELEASE_3_1_0:1.1
	RELEASE_2_2_8:1.1
	RELEASE_3_0_0:1.1
	RELEASE_2_2_7:1.1
	RELEASE_2_2_6:1.1
	RELEASE_2_2_5:1.1;
locks; strict;
comment	@# @;


1.2
date	2002.10.13.03.56.09;	author kris;	state dead;
branches;
next	1.1;

1.1
date	97.08.05.08.36.00;	author torstenb;	state Exp;
branches;
next	;


desc
@@


1.2
log
@tcp_wrapper has been in the base system since 4.0-RELEASE.  Remove it.
@
text
@*** tcpdchk.8.orig	Tue Aug  5 10:18:09 1997
--- tcpdchk.8	Tue Aug  5 10:18:29 1997
***************
*** 8,14 ****
  \fItcpdchk\fR examines your tcp wrapper configuration and reports all
  potential and real problems it can find. The program examines the
  \fItcpd\fR access control files (by default, these are
! \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
  entries in these files against entries in the \fIinetd\fR or \fItlid\fR
  network configuration files.
  .PP
--- 8,14 ----
  \fItcpdchk\fR examines your tcp wrapper configuration and reports all
  potential and real problems it can find. The program examines the
  \fItcpd\fR access control files (by default, these are
! \fI!!PREFIX!!/etc/hosts.allow\fR and \fI!!PREFIX!!/etc/hosts.deny\fR), and compares the
  entries in these files against entries in the \fIinetd\fR or \fItlid\fR
  network configuration files.
  .PP
***************
*** 44,52 ****
  .PP
  The default locations of the \fItcpd\fR access control tables are:
  .PP
! /etc/hosts.allow
  .br
! /etc/hosts.deny
  .SH SEE ALSO
  .na
  .nf
--- 44,52 ----
  .PP
  The default locations of the \fItcpd\fR access control tables are:
  .PP
! !!PREFIX!!/etc/hosts.allow
  .br
! !!PREFIX!!/etc/hosts.deny
  .SH SEE ALSO
  .na
  .nf
@


1.1
log
@/etc/hosts.{allow,deny} -> $PREFIX/etc/hosts.{allow,deny}
@
text
@@

