Author: hanska-guest
Date: 2008-06-09 14:16:26 +0000 (Mon, 09 Jun 2008)
New Revision: 181

Modified:
   trunk/debian/changelog
   trunk/debian/man/john.8
Log:
* debian/man/john.8:
  - updated the locations of john's session files (Closes: #360591)
  - updated descriptions of --rules and --test (Closes: #485422)

Modified: trunk/debian/changelog
===================================================================
--- trunk/debian/changelog      2008-06-02 15:22:35 UTC (rev 180)
+++ trunk/debian/changelog      2008-06-09 14:16:26 UTC (rev 181)
@@ -1,3 +1,11 @@
+john (1.7.2-4) UNRELEASED; urgency=low
+
+  * debian/man/john.8:
+    - updated the locations of john's session files (Closes: #360591)
+    - updated descriptions of --rules and --test (Closes: #485422)
+
+ -- David Paleino <[EMAIL PROTECTED]>  Mon, 09 Jun 2008 16:15:19 +0200
+
 john (1.7.2-3) unstable; urgency=low
 
   * Merged debian/changelog from old experimental version (1.7-1 and

Modified: trunk/debian/man/john.8
===================================================================
--- trunk/debian/man/john.8     2008-06-02 15:22:35 UTC (rev 180)
+++ trunk/debian/man/john.8     2008-06-09 14:16:26 UTC (rev 181)
@@ -4,13 +4,14 @@
 .\" Jordi Mallach <[EMAIL PROTECTED]>
 .\" This is free documentation, see the latest version of the GNU General
 .\" Public License for copying conditions. There is NO warranty.
-.TH JOHN 8 "June 03, 2004" john
+.TH JOHN 8 "June 09, 2008" john
 .\" Please adjust this date whenever revising the manpage.
 .SH NAME
 john \- a tool to find weak passwords of your users
 .SH SYNOPSIS
 .B john
-.RI [ options ] "password-files"
+.RI [ options ]
+password-files
 .SH DESCRIPTION
 This manual page documents briefly the
 .B john
@@ -29,8 +30,8 @@
 "wordlist" and finally "incremental".
 .P
 Once John finds a password, it will be printed to the terminal and saved
-into a file called ~/john.pot. John will read this file when it restarts
-so it doesn't try to crack already done passwords.
+into a file called ~/.john/john.pot. John will read this file when it 
+restarts so it doesn't try to crack already done passwords.
 .P
 To see the cracked passwords, use
 .P
@@ -41,12 +42,14 @@
 .P
 While cracking, you can press any key for status, or Ctrl+C to abort the
 session, saving point information to a file (
-.I ~/restore
+.I ~/.john/john.rec
 by default). By the
 way, if you press Ctrl+C twice John will abort immediately without saving.
 The point information is also saved every 10 minutes (configurable in the
 configuration file,
-.I ~/john.ini
+.I ~/.john/john.ini
+or
+.I ~/.john/john.conf
 ) in case of a crash.
 .P
 To continue an interrupted session, run:
@@ -101,17 +104,27 @@
 (section [Incremental:MODE], or [Incremental:All] by default).
 .TP
 .B \-makechars:FILE
-Generates a charset file, based on character frequencies from ~/john.pot,
-for use with the incremental mode. The entire ~/john.pot will be used for
-the charset file unless you specify some password files. You can also use
-an external filter() routine with this option.
+Generates a charset file, based on character frequencies from
+~/.john/john.pot, for use with the incremental mode. The entire 
+~/.john/john.pot will be used for the charset file unless you specify 
+some password files. You can also use an external filter() routine with 
+this option.
 .TP
 .B \-restore[:FILE]
 Continues an interrupted cracking session, reading point information from
-the specified file (~/restore by default).
+the specified file (~/.john/john.rec by default).
 .TP
 .B \-rules
-Enables wordlist rules, that are read from [List.Rules:Wordlist].
+Enables wordlist rules, that are read from [List.Rules:Wordlist] in
+.I /etc/john/john.conf
+(or the alternative configuration file you might specify on the command 
+line).
+.br
+This option
+.B requires
+the
+.B -wordlist
+option to be passed as well.
 .TP
 .B \-salts:[\-]COUNT
 This feature sometimes allows to achieve better performance. For example
@@ -163,6 +176,11 @@
 .B \-test
 Benchmarks all the enabled ciphertext format crackers, and tests them for
 correct operation at the same time.
+.br
+This option does
+.B not
+need any file passed as argument. Its only function is to benchmark the 
+system john is running on.
 .TP
 .B \-users:[\-]LOGIN|UID[,..]
 Allows you to filter a few accounts for cracking, etc. A dash before the


_______________________________________________
Pkg-john-commits mailing list
Pkg-john-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-john-commits

Reply via email to