On Tuesday 13 February 2007 21:00, Warren Block wrote: > On Tue, 13 Feb 2007, Bob wrote: > > On Tue, 13 Feb 2007 16:41:29 -0600 > > > > Paul Schmehl <[EMAIL PROTECTED]> wrote: > >> Yikes! That's a bit drastic. What's wrong with make > >> DISABLE_VULNERABILITIES install? > > > > Where would I find the documentation on all the possible > > command-line options to make? IE, where is DISABLE_VULNERABILITIES > > documented? > > man ports > > ISTR using it with portupgrade with the -M option. >
Here is what I use. I gave it an alias and called it portforce portupgrade -puf -m -DDISABLE_VULNERABILITIES Kent > A probably-better way to fix the vulnerabilities of Mozilla is to > switch to the newest version, which is now called Seamonkey. > > > I am sure I would have occasion to use others if I knew what and > > where they were. > > Also in the ports man page. Other targets also avoid brute-force > removal of files, like rmconfig. > > -Warren Block * Rapid City, South Dakota USA > _______________________________________________ > firstname.lastname@example.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to > "[EMAIL PROTECTED]" -- Kent Stewart Richland, WA http://www.soyandina.com/ "I am Andean project". http://users.owt.com/kstewart/index.html _______________________________________________ email@example.com mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"