aboutsummaryrefslogtreecommitdiffstats
path: root/fetchmail.man
diff options
context:
space:
mode:
authorMatthias Andree <matthias.andree@gmx.de>2006-03-31 00:25:58 +0000
committerMatthias Andree <matthias.andree@gmx.de>2006-03-31 00:25:58 +0000
commit9db4126dddb31083d0c0713851af3506174a5ced (patch)
tree77fb0bf4b724c672502187bfade59f0fbb17dc10 /fetchmail.man
parentf9b92979c796311177255c6a43414947eb7c7e2c (diff)
downloadfetchmail-9db4126dddb31083d0c0713851af3506174a5ced.tar.gz
fetchmail-9db4126dddb31083d0c0713851af3506174a5ced.tar.bz2
fetchmail-9db4126dddb31083d0c0713851af3506174a5ced.zip
Revise a bunch of links.
Remove UWIMAP and qpopper propaganda from FAQ, replace by a Dovecot plug, and warn of qmail. svn path=/branches/BRANCH_6-3/; revision=4762
Diffstat (limited to 'fetchmail.man')
-rw-r--r--fetchmail.man2
1 files changed, 1 insertions, 1 deletions
diff --git a/fetchmail.man b/fetchmail.man
index 92cb5a96..7d988fe0 100644
--- a/fetchmail.man
+++ b/fetchmail.man
@@ -1039,7 +1039,7 @@ can protect you from a passive eavesdropper it doesn't help against an
active attacker. It's clearly an improvement over sending the
passwords in clear but you should be aware that a man-in-the-middle
attack is trivially possible (in particular with tools such as dsniff,
-http://www.monkey.org/~dugsong/dsniff/). Use of an ssh tunnel (see
+http://monkey.org/~dugsong/dsniff/). Use of an ssh tunnel (see
below for some examples) is preferable if you care seriously about the
security of your mailbox.
.SS ESMTP AUTH