path: root/README.tru64
diff options
authorGerald Combs <gerald@wireshark.org>2016-08-11 09:10:48 -0700
committerAnders Broman <a.broman58@gmail.com>2016-08-18 04:26:32 +0000
commit635f0a5c2cea2f8156281953f49568e1129debf1 (patch)
treec4f45122db36776fcadb11bf03c1a77d7c068971 /README.tru64
parent38a38abc17bc726bbec6b85bafb3db88dde5e5a5 (diff)
Update the README.
The formatting was mostly AsciiDoc-compliant. Take it the rest of the way. Update the list of supported operating sytems, along with other info. Use HTTPS URLs. Remove README.tru64 while we're here. Change-Id: Ibd9cac5d9f3cdcc7de9c9d7052c14e851e108cbe Reviewed-on: https://code.wireshark.org/review/17014 Reviewed-by: Gerald Combs <gerald@wireshark.org> Petri-Dish: Gerald Combs <gerald@wireshark.org> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'README.tru64')
1 files changed, 0 insertions, 49 deletions
diff --git a/README.tru64 b/README.tru64
deleted file mode 100644
index 6f0ebd8be7..0000000000
--- a/README.tru64
+++ /dev/null
@@ -1,49 +0,0 @@
-The following instructions are applicable to Tru64 UNIX
-(formerly Digital UNIX (formerly DEC OSF/1)) version 4.0, and
-probably to later versions as well; at least some options apply to
-Digital UNIX 3.2 - perhaps all do.
-In order to use kernel packet filtering on this system, you have
-to configure it in such a way :
-Kernel configuration
-The packet filtering kernel option must be enabled at kernel
-installation. If it was not the case, you can rebuild the kernel with
-"doconfig -c" after adding the following line in the kernel
-configuration file (/sys/conf/<HOSTNAME>):
-or use "doconfig" without any arguments to add the packet filter driver
-option via the kernel option menu (see the system administration
-documentation for information on how to do this).
-Device configuration
-Devices used for packet filtering must be created thanks to
-the following command (executed in the /dev directory):
- ./MAKEDEV pfilt
-Interface configuration
-In order to capture all packets on a network, you may want to allow
-applications to put the interface on that network into "local copy"
-mode, so that Wireshark can see packets sent by the host on which it's
-running as well as packets received by that host, and to put the
-interface into "promiscuous" mode, so that Wireshark can see packets on
-the network segment not sent to the host on which it's running, by using
-the pfconfig(1) command:
- pfconfig +c +p <network_device>
-or allow application to put any interface into "local copy" or
-"promiscuous" mode by using the command:
- pfconfig +c +p -a
-Note: all instructions given require root privileges.