diff options
author | Dmitry Marakasov <amdmi3@FreeBSD.org> | 2022-04-01 15:08:31 +0000 |
---|---|---|
committer | Dmitry Marakasov <amdmi3@FreeBSD.org> | 2022-04-01 15:09:49 +0000 |
commit | 7b4d1f0b36f88f7fee1898a9cc10c2acf261a123 (patch) | |
tree | 2abf1c896f8e1fd58b9c4e767d74a5ba36df7259 /security/pwned-check | |
parent | fda98f5fc2459e6d2a205ca94c44ec038b560866 (diff) | |
download | ports-7b4d1f0b36f88f7fee1898a9cc10c2acf261a123.tar.gz ports-7b4d1f0b36f88f7fee1898a9cc10c2acf261a123.zip |
*/*: fix trailing whitespace in pkg-descr's
Approved by: portmgr blanket
Diffstat (limited to 'security/pwned-check')
-rw-r--r-- | security/pwned-check/pkg-descr | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/security/pwned-check/pkg-descr b/security/pwned-check/pkg-descr index 60a265c1099e..2769b48e5b8d 100644 --- a/security/pwned-check/pkg-descr +++ b/security/pwned-check/pkg-descr @@ -1,6 +1,6 @@ -Pwned Passwords are hundreds of millions of real world passwords exposed in +Pwned Passwords are hundreds of millions of real world passwords exposed in data breaches. This exposure makes them unsuitable for ongoing use as they -are at much greater risk of being used to take over other accounts. +are at much greater risk of being used to take over other accounts. This script offers 2 methods to check whether a password has been exposed in an uncovered breach: @@ -11,7 +11,7 @@ in an uncovered breach: 2) Local check against a copy of the pawned passwords database. Since the local copy of the database requires nearly 20 GB of disk space -(and a download of more than 10 GB of compressed data) the access via the +(and a download of more than 10 GB of compressed data) the access via the online check should be preferred, if the compatible with operational and security requirements. |