On Tuesday 13 February 2007 21:00, Warren Block wrote:
> On Tue, 13 Feb 2007, Bob wrote:
> > On Tue, 13 Feb 2007 16:41:29 -0600
> >
> > Paul Schmehl <[EMAIL PROTECTED]> wrote:
> >> Yikes!  That's a bit drastic.  What's wrong with make
> >> DISABLE_VULNERABILITIES install?
> >
> > Where would I find the documentation on all the possible
> > command-line options to make? IE, where is DISABLE_VULNERABILITIES
> > documented?
>
> man ports
>
> ISTR using it with portupgrade with the -M option.
>

Here is what I use. I gave it an alias and called it portforce
portupgrade -puf -m -DDISABLE_VULNERABILITIES

Kent

> A probably-better way to fix the vulnerabilities of Mozilla is to
> switch to the newest version, which is now called Seamonkey.
>
> > I am sure I would have occasion to use others if I knew what and
> > where they were.
>
> Also in the ports man page.  Other targets also avoid brute-force
> removal of files, like rmconfig.
>
> -Warren Block * Rapid City, South Dakota USA
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "[EMAIL PROTECTED]"

-- 
Kent Stewart
Richland, WA

http://www.soyandina.com/ "I am Andean project".
http://users.owt.com/kstewart/index.html
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to