<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Nmap-Interface</title><link>https://sourceforge.net/p/team143sdd/wiki/Nmap-Interface/</link><description>Recent changes to Nmap-Interface</description><atom:link href="https://sourceforge.net/p/team143sdd/wiki/Nmap-Interface/feed" rel="self"/><language>en</language><lastBuildDate>Fri, 28 Oct 2011 14:28:47 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/team143sdd/wiki/Nmap-Interface/feed" rel="self" type="application/rss+xml"/><item><title>WikiPage Nmap-Interface modified by FireElemental</title><link>https://sourceforge.net/p/team143sdd/wiki/Nmap-Interface/</link><description>&lt;pre&gt;--- v4 
+++ v5 
@@ -4,6 +4,9 @@
 The full functionality of the port scanner nmap will be at the users disposal. Optional arguments are passed into an argument field.
 
 For Basic port-scanning user should reference: http://nmap.org/book/man-port-scanning-basics.html
+
 For port-scanning techniques user should reference: http://nmap.org/book/man-port-scanning-techniques.html
+
 For OS detection user should reference: http://nmap.org/book/man-os-detection.html
+
 For Firewall/IDS evasion and spoofing user should reference: http://nmap.org/book/man-bypass-firewalls-ids.html 
&lt;/pre&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">FireElemental</dc:creator><pubDate>Fri, 28 Oct 2011 14:28:47 -0000</pubDate><guid>https://sourceforge.netfdb311ccad62f16a970057f147e5ee8c1d554716</guid></item><item><title>WikiPage Nmap-Interface modified by FireElemental</title><link>https://sourceforge.net/p/team143sdd/wiki/Nmap-Interface/</link><description>&lt;pre&gt;--- v3 
+++ v4 
@@ -4,9 +4,6 @@
 The full functionality of the port scanner nmap will be at the users disposal. Optional arguments are passed into an argument field.
 
 For Basic port-scanning user should reference: http://nmap.org/book/man-port-scanning-basics.html
-
 For port-scanning techniques user should reference: http://nmap.org/book/man-port-scanning-techniques.html
-
-for OS detection user should reference: http://nmap.org/book/man-os-detection.html
-
+For OS detection user should reference: http://nmap.org/book/man-os-detection.html
 For Firewall/IDS evasion and spoofing user should reference: http://nmap.org/book/man-bypass-firewalls-ids.html 
&lt;/pre&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">FireElemental</dc:creator><pubDate>Fri, 28 Oct 2011 14:28:31 -0000</pubDate><guid>https://sourceforge.netdc79e8c5fa76b2e42b1cb0976d07f89f6e3a35d2</guid></item><item><title>WikiPage Nmap-Interface modified by FireElemental</title><link>https://sourceforge.net/p/team143sdd/wiki/Nmap-Interface/</link><description>&lt;pre&gt;--- v2 
+++ v3 
@@ -1,5 +1,5 @@
-nmap user specification
----------------------------
+Nmap
+---------------------------------------------------------------------------------------------
 
 The full functionality of the port scanner nmap will be at the users disposal. Optional arguments are passed into an argument field.
 
&lt;/pre&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">FireElemental</dc:creator><pubDate>Fri, 28 Oct 2011 14:28:01 -0000</pubDate><guid>https://sourceforge.net58baebbbd886b55094c689e51f0c1d819a1c78cf</guid></item><item><title>WikiPage Nmap-Interface modified by FireElemental</title><link>https://sourceforge.net/p/team143sdd/wiki/Nmap-Interface/</link><description>&lt;pre&gt;--- v1 
+++ v2 
@@ -1,12 +1,12 @@
 nmap user specification
 ---------------------------
 
-The full functionality of the port scanner nmap will be at the users disposal. some of the basic features that are included (via command line arguments in the console) are as follows:
-
-    -A: This shortcut option turns on Advanced and Aggressive features such as OS and service detection.
-
-    -PE -PP: host discovery techniques (ping types) used in combination to determine which targets on a network really available and avoid wasting a lot of time scanning IP addresses that are not in use.
-  
-    -PN: Host enumeration is disabled with use of pn 
-
-To use the more advanced features the user should reference the nmap documentation at http://nmap.org/docs.html
+The full functionality of the port scanner nmap will be at the users disposal. Optional arguments are passed into an argument field.
+
+For Basic port-scanning user should reference: http://nmap.org/book/man-port-scanning-basics.html
+
+For port-scanning techniques user should reference: http://nmap.org/book/man-port-scanning-techniques.html
+
+for OS detection user should reference: http://nmap.org/book/man-os-detection.html
+
+For Firewall/IDS evasion and spoofing user should reference: http://nmap.org/book/man-bypass-firewalls-ids.html 
&lt;/pre&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">FireElemental</dc:creator><pubDate>Fri, 28 Oct 2011 14:26:48 -0000</pubDate><guid>https://sourceforge.netf910a743ce09b85d700df60d2f6b7c13b2e0a398</guid></item><item><title>WikiPage Nmap-Interface modified by FireElemental</title><link>https://sourceforge.net/p/team143sdd/wiki/Nmap-Interface/</link><description>nmap user specification
---------------------------

The full functionality of the port scanner nmap will be at the users disposal. some of the basic features that are included (via command line arguments in the console) are as follows:

    -A: This shortcut option turns on Advanced and Aggressive features such as OS and service detection.

    -PE -PP: host discovery techniques (ping types) used in combination to determine which targets on a network really available and avoid wasting a lot of time scanning IP addresses that are not in use.
  
    -PN: Host enumeration is disabled with use of pn 

To use the more advanced features the user should reference the nmap documentation at http://nmap.org/docs.html</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">FireElemental</dc:creator><pubDate>Sat, 15 Oct 2011 16:04:41 -0000</pubDate><guid>https://sourceforge.net8e59228b9c02399c2caadd60291f32a709c278e8</guid></item></channel></rss>