=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/Attic/press.html,v retrieving revision 1.604 retrieving revision 1.605 diff -c -r1.604 -r1.605 *** www/Attic/press.html 2016/03/21 05:46:20 1.604 --- www/Attic/press.html 2016/03/22 10:54:43 1.605 *************** *** 1119,1128 **** basics. It begins with an history of the different implementations, and is punctuated with examples. Tunneling features are described, as well as ! scp, ! ssh-agent, and ! sftp.

  • --- 1119,1128 ---- basics. It begins with an history of the different implementations, and is punctuated with examples. Tunneling features are described, as well as ! scp, ! ssh-agent, and ! sftp.

  • *************** *** 1954,1960 **** Systrace in OpenBSD, informit.com, January 28, 2005
    This article talks about our systrace ! systrace(1) mechanism: what it is and why and how to use it, with examples. Another excerpt from the book --- 1954,1960 ---- Systrace in OpenBSD, informit.com, January 28, 2005

    This article talks about our systrace ! systrace(1) mechanism: what it is and why and how to use it, with examples. Another excerpt from the book *************** *** 2049,2055 **** their hardware and software operates. This lack of trust is one reason why OpenBSD has recently completed reverse-engineering the ! Atheros wireless chipset driver that was originally provided as a binary insert.

    --- 2049,2055 ---- their hardware and software operates. This lack of trust is one reason why OpenBSD has recently completed reverse-engineering the ! Atheros wireless chipset driver that was originally provided as a binary insert.

    *************** *** 4400,4406 **** NewsForge, June 6, 2001
    ! OpenBSD gets brand-new packet filter (Slashdot echoes OpenBSD pf(4) development.), Slashdot, June 25, 2001

    --- 4400,4406 ---- NewsForge, June 6, 2001
    ! OpenBSD gets brand-new packet filter (Slashdot echoes OpenBSD pf(4) development.), Slashdot, June 25, 2001

    *************** *** 4998,5006 **** and the ISAKMPD key management daemon. He admits his implementation, though quite serviceable, only scratches the surface of the capabilities available. He strongly suggests going through the man pages ! (vpn(8), ! ipsec(4) and ! isakmpd(8)) and the OpenBSD IPsec FAQ to get the most out of the system.

    --- 4998,5006 ---- and the ISAKMPD key management daemon. He admits his implementation, though quite serviceable, only scratches the surface of the capabilities available. He strongly suggests going through the man pages ! (vpn(8), ! ipsec(4) and ! isakmpd(8)) and the OpenBSD IPsec FAQ to get the most out of the system.