notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

non port: security/arpCounterattack/pkg-plist

Number of commits found: 3

Thursday, 13 Nov 2014
09:02 antoine search for other commits by this committer
Cleanup plist
Original commitRevision:372514 
Monday, 7 Jul 2014
15:16 marino search for other commits by this committer
security/arpCounterattack: stage, fix on F10+, fix on DragonFly

Also:
 * convert to c++11 for clang builds
 * convert to new LIB_DEPENDS format
 * use @sample keyword
 * pet portlint
 * USE=tar
Original commitRevision:361098 
Wednesday, 27 Apr 2011
17:42 skreuzer search for other commits by this committer
arpCounterattack is a program for detecting and remedying "ARP attacks." It
monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
and corrective gratuitous ARP reply can be sent from an Ethernet interface
other than the one that the attack was seen on.

WWW: http://acm.poly.edu/wiki/ARP_Counterattack

PR:             ports/151973
Submitted by:   Boris Kochergin <spawk@acm.poly.edu>
Original commit

Number of commits found: 3