From d54b551f6c3ff66b7d2f04bd9780295ae7e454ce Mon Sep 17 00:00:00 2001 From: Michael Osipov <1983-01-06@gmx.net> Date: Sat, 15 Nov 2014 11:10:29 +0000 Subject: docs: Use consistent naming for Kerberos --- docs/INTERNALS | 2 +- docs/libcurl/libcurl-tutorial.3 | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) (limited to 'docs') diff --git a/docs/INTERNALS b/docs/INTERNALS index 70e060f3e..8654c45f9 100644 --- a/docs/INTERNALS +++ b/docs/INTERNALS @@ -42,7 +42,7 @@ Portability libidn 0.4.1 cyassl 2.0.0 openldap 2.0 - MIT krb5 lib 1.2.4 + MIT Kerberos 1.2.4 GSKit V5R3M0 NSS 3.14.x axTLS 1.2.7 diff --git a/docs/libcurl/libcurl-tutorial.3 b/docs/libcurl/libcurl-tutorial.3 index 4dcdc55f1..d496e7027 100644 --- a/docs/libcurl/libcurl-tutorial.3 +++ b/docs/libcurl/libcurl-tutorial.3 @@ -1129,9 +1129,9 @@ analyzer tool and eavesdrop on your passwords. Don't let the fact that HTTP Basic uses base64 encoded passwords fool you. They may not look readable at a first glance, but they very easily "deciphered" by anyone within seconds. -To avoid this problem, use HTTP authentication methods or other protocols that -don't let snoopers see your password: HTTP with Digest, NTLM or GSS -authentication, HTTPS, FTPS, SCP, SFTP and FTP-Kerberos are a few examples. +To avoid this problem, use an authentication mechanism or other protocol that +doesn't let snoopers see your password: Digest, CRAM-MD5, Kerberos, SPNEGO or +NTLM authentication, HTTPS, FTPS, SCP and SFTP are a few examples. .IP "Redirects" The \fICURLOPT_FOLLOWLOCATION(3)\fP option automatically follows HTTP -- cgit v1.2.3