|author||Gerald Combs <email@example.com>||2016-08-11 09:10:48 -0700|
|committer||Anders Broman <firstname.lastname@example.org>||2016-08-18 04:26:32 +0000|
Update the README.
The formatting was mostly AsciiDoc-compliant. Take it the rest of the way. Update the list of supported operating sytems, along with other info. Use HTTPS URLs. Remove README.tru64 while we're here. Change-Id: Ibd9cac5d9f3cdcc7de9c9d7052c14e851e108cbe Reviewed-on: https://code.wireshark.org/review/17014 Reviewed-by: Gerald Combs <email@example.com> Petri-Dish: Gerald Combs <firstname.lastname@example.org> Tested-by: Petri Dish Buildbot <email@example.com> Reviewed-by: Anders Broman <firstname.lastname@example.org>
Diffstat (limited to 'README.tru64')
1 files changed, 0 insertions, 49 deletions
diff --git a/README.tru64 b/README.tru64
deleted file mode 100644
@@ -1,49 +0,0 @@
-The following instructions are applicable to Tru64 UNIX
-(formerly Digital UNIX (formerly DEC OSF/1)) version 4.0, and
-probably to later versions as well; at least some options apply to
-Digital UNIX 3.2 - perhaps all do.
-In order to use kernel packet filtering on this system, you have
-to configure it in such a way :
-The packet filtering kernel option must be enabled at kernel
-installation. If it was not the case, you can rebuild the kernel with
-"doconfig -c" after adding the following line in the kernel
-configuration file (/sys/conf/<HOSTNAME>):
- option PACKETFILTER
-or use "doconfig" without any arguments to add the packet filter driver
-option via the kernel option menu (see the system administration
-documentation for information on how to do this).
-Devices used for packet filtering must be created thanks to
-the following command (executed in the /dev directory):
- ./MAKEDEV pfilt
-In order to capture all packets on a network, you may want to allow
-applications to put the interface on that network into "local copy"
-mode, so that Wireshark can see packets sent by the host on which it's
-running as well as packets received by that host, and to put the
-interface into "promiscuous" mode, so that Wireshark can see packets on
-the network segment not sent to the host on which it's running, by using
-the pfconfig(1) command:
- pfconfig +c +p <network_device>
-or allow application to put any interface into "local copy" or
-"promiscuous" mode by using the command:
- pfconfig +c +p -a
-Note: all instructions given require root privileges.