--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2017-4e176d4139
2017-02-20 21:24:10.133577
--------------------------------------------------------------------------------

Name        : ncrack
Product     : Fedora EPEL 7
Version     : 0.4
Release     : 0.11.ALPHA.el7
URL         : http://nmap.org/ncrack/
Summary     : High-speed network auth cracking tool
Description :
Ncrack is a high-speed network authentication cracking tool. It was
built to help companies secure their networks by proactively testing
all their hosts and networking devices for poor passwords. Security
professionals also rely on Ncrack when auditing their clients. Ncrack
was designed using a modular approach, a command-line syntax similar to
Nmap and a dynamic engine that can adapt its behaviour based on network
feedback. It allows for rapid, yet reliable large-scale auditing of
multiple hosts.

--------------------------------------------------------------------------------
Update Information:

Initial ncrack package release for EPEL7.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1411761 - ncrack: please build for EPEL7
        https://bugzilla.redhat.com/show_bug.cgi?id=1411761
--------------------------------------------------------------------------------

This update can be installed with the "yum" update programs.  Use
su -c 'yum update ncrack' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/System_Administrators_Guide/ch-yum.html

All packages are signed with the Fedora EPEL GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
epel-package-announce mailing list -- 
[email protected]
To unsubscribe send an email to 
[email protected]

Reply via email to