From 04cfbc7854bb793481e9050264a1f0cac1c6198a Mon Sep 17 00:00:00 2001 From: John Terpstra Date: Fri, 29 Aug 2003 01:15:53 +0000 Subject: Update pre-release of RC2. Note: Due to config errors not all manpages were rebuilt. (This used to be commit 01fde1a40b11e73cc98f09ab2ebbd14ed0bed4cf) --- docs/htmldocs/swat.8.html | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'docs/htmldocs/swat.8.html') diff --git a/docs/htmldocs/swat.8.html b/docs/htmldocs/swat.8.html index 33e595e0c3..a7f2eaaf5b 100644 --- a/docs/htmldocs/swat.8.html +++ b/docs/htmldocs/swat.8.html @@ -33,9 +33,9 @@ amounts of log data, and should only be used when investigating a problem. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic.

Note that specifying this parameter here will -override the log level parameter +override the log level parameter in the smb.conf file.

-l|--logfile=logbasename

File name for log/debug files. The extension -".client" will be appended. The log file is +".client" will be appended. The log file is never removed by the client.

-h|--help

Print a summary of command line options.

INSTALLATION

Swat is included as binary package with most distributions. The @@ -60,7 +60,7 @@ never removed by the client. and /etc/inetd.conf you need to send a HUP signal to inetd. To do this use kill -1 PID where PID is the process ID of the inetd daemon.

LAUNCHING

To launch SWAT just run your favorite web browser and - point it at "http://localhost:901/".

Note that you can attach to SWAT from any IP connected + point it at "http://localhost:901/".

Note that you can attach to SWAT from any IP connected machine but connecting from a remote machine leaves your connection open to password sniffing as passwords will be sent in the clear over the wire.

FILES

/etc/inetd.conf

This file must contain suitable startup -- cgit