From owner-man-jp-reviewer@jp.FreeBSD.org Sun Aug 31 00:37:40 2003
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6p2+3.4W/8.11.3) id h7UFbeh90029;
	Sun, 31 Aug 2003 00:37:40 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from rwcrmhc11.comcast.net (rwcrmhc11.comcast.net [204.127.198.35])
	by castle.jp.FreeBSD.org (8.11.6p2+3.4W/8.11.3) with ESMTP/inet id h7UFbda90014
	for <man-jp-reviewer@jp.freebsd.org>; Sun, 31 Aug 2003 00:37:39 +0900 (JST)
	(envelope-from horikawa@jp.freebsd.org)
Received: from localhost (12-252-35-167.client.attbi.com[12.252.35.167](untrusted sender))
          by comcast.net (rwcrmhc11) with SMTP
          id <2003083015363101300q6tt3e>; Sat, 30 Aug 2003 15:36:32 +0000
Message-Id: <20030830.093451.104029507.horikawa@attbi.com>
To: man-jp-reviewer@jp.FreeBSD.org
From: Kazuo Horikawa <horikawa@jp.FreeBSD.org>
X-Mailer: Mew version 3.2 on Emacs 21.3 / Mule 5.0 (SAKAKI)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Reply-To: man-jp-reviewer@jp.FreeBSD.org
Precedence: list
Date: Sat, 30 Aug 2003 09:34:51 -0600
X-Sequence: man-jp-reviewer 4504
Subject: [man-jp-reviewer 4504] (new) conscontrol.8, setfsmac.8, ugidfw.8
Sender: owner-man-jp-reviewer@jp.FreeBSD.org
X-Originator: horikawa@jp.FreeBSD.org
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+030830

$BKY@n$G$9!#(B
conscontrol.8, setfsmac.8, ugidfw.8 $B$N?7Lu$G$9!#(B

--- conscontrol.8~	Sun Aug 24 14:54:13 2003
+++ conscontrol.8	Sun Aug 24 15:07:20 2003
@@ -23,15 +23,16 @@
 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 .\" SUCH DAMAGE.
 .\"
-.\" $FreeBSD: src/sbin/conscontrol/conscontrol.8,v 1.4 2002/07/06 19:32:42 charnier Exp $
+.\" %FreeBSD: src/sbin/conscontrol/conscontrol.8,v 1.4 2002/07/06 19:32:42 charnier Exp %
 .\"
+.\" $FreeBSD$
 .Dd October 23, 2001
 .Dt CONSCONTROL 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm conscontrol
-.Nd control physical console devices
-.Sh SYNOPSIS
+.Nd $BJ*M}%3%s%=!<%k%G%P%$%9$N@)8f(B
+.Sh $B=q<0(B
 .Nm
 .Op Cm list
 .Nm
@@ -39,59 +40,58 @@
 .Nm
 .Cm add | delete
 .Ar console
-.Sh DESCRIPTION
-The
+.Sh $B2r@b(B
 .Nm
-utility is used to examine and modify the physical devices which back
-the virtual console devices.
-If no arguments
-(or only the
+$B%f!<%F%#%j%F%#$O!"2>A[%3%s%=!<%k%G%P%$%9$NGX8e$K$"$kJ*M}%G%P%$%9$r(B
+$B8!::$7$?$jJQ99$7$?$j$9$k$?$a$K;HMQ$7$^$9!#(B
+$B0z?t$r;XDj$7$J$$$H(B
+($B$^$?$O(B
 .Cm list
-command)
-are specified,
-the current console settings are shown.
+$B%3%^%s%I$N$_$r;XDj$9$k$H(B)$B!"(B
+$B8=:_$N%3%s%=!<%k@_Dj$,I=<($5$l$^$9!#(B
 .Pp
-There are two types of logical consoles; a high level console which
-is represented by
-.Pa /dev/console ,
-and a low level console.
-The low level console is used for kernel
+$BO@M}%3%s%=!<%k$K$O(B 2 $B<oN`$"$j$^$9!#(B
+$B$=$l$O!"(B
+.Pa /dev/console
+$B$GI=8=$5$l$k9b%l%Y%k%3%s%=!<%k$H!"Dc%l%Y%k%3%s%=!<%k$G$9!#(B
+$BDc%l%Y%k%3%s%=!<%k$O!"%+!<%M%k$N(B
 .Xr printf 9
-and
+$B$H(B
 .Xr ddb 4
-debugger support,
-while the high level console is used by user programs like
-.Xr syslogd 8 .
-Multiple device support is implemented only for the low level console;
-the high level console is set to the first device in the console list.
+$B%G%P%C%,%5%]!<%H$K;HMQ$5$l!"9b%l%Y%k%3%s%=!<%k$O(B
+.Xr syslogd 8
+$B$J$I$N%f!<%6%W%m%0%i%`$K;HMQ$5$l$^$9!#(B
+$BJ#?t%G%P%$%9%5%]!<%H$O!"Dc%l%Y%k%3%s%=!<%k$KBP$7$F$N$_<BAu$5$l$F$$$^$9!#(B
+$B9b%l%Y%k%3%s%=!<%k$O!"%3%s%=!<%k%j%9%H$N:G=i$N%G%P%$%9$K@_Dj$5$l$^$9!#(B
 .Pp
-Multiple console support may be invoked by passing the kernel the
+$BJ#?t%3%s%=!<%k%5%]!<%H$N5/F0$O!"%V!<%H%m!<%@$+$i(B
 .Fl D
-flag from the boot loader, or by using
+$B%U%i%0$r%+!<%M%k$KEO$9$+!"%7%9%F%`%V!<%H40N;8e$K(B
 .Nm
-to change the list of console devices after the system has booted.
+$B$r;HMQ$7$F%3%s%=!<%k%G%P%$%9$N%j%9%H$rJQ99$9$k$3$H$G2DG=$G$9!#(B
 .Pp
-The following options are available:
+$B<!$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Cm add | delete Ar console
-Add or delete a physical device from the logical console.
-The device must support low-level console operations.
-Adding a device will place it at the front of the list of console
-devices; the first device is used for the high level console.
+$BO@M}%3%s%=!<%k$KBP$7!"J*M}%G%P%$%9$rDI2C$^$?$O:o=|$7$^$9!#(B
+$BBP>]%G%P%$%9$O!"Dc%l%Y%k%3%s%=!<%kA`:n$r%5%]!<%H$9$k$3$H$,I,MW$G$9!#(B
+$B%G%P%$%9$rDI2C$9$k$H!"$=$l$O%3%s%=!<%k%G%P%$%9%j%9%H$N@hF,$KCV$+$l$^$9!#(B
+$B:G=i$N%G%P%$%9$,!"9b%l%Y%k%3%s%=!<%k$H$7$F;HMQ$5$l$^$9!#(B
 .It Cm mute on | off
-Change the state of console muting.
-All console output is suppressed when console muting is
-.Cm on .
+$B%3%s%=!<%k$N%_%e!<%H>uBV$rJQ99$7$^$9!#(B
+$B%3%s%=!<%k$N%_%e!<%H$,(B
+.Cm on
+$B$N>l9g!"$9$Y$F$N%3%s%=!<%k=PNO$,M^@)$5$l$^$9!#(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr sio 4 ,
 .Xr syscons 4 ,
 .Xr boot 8 ,
 .Xr loader 8
-.Sh HISTORY
-The
+.Sh $BNr;K(B
 .Nm
-utility first appeared in
-.Fx 5.0 .
-.Sh AUTHORS
+$B%f!<%F%#%j%F%#$,:G=i$KEP>l$7$?$N$O(B
+.Fx 5.0
+$B$G$9(B
+.Sh $B:n<T(B
 .An Jonathan Lemon

--- setfsmac.8~	Sun Aug 24 23:02:21 2003
+++ setfsmac.8	Sun Aug 24 23:23:39 2003
@@ -28,94 +28,98 @@
 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 .\" SUCH DAMAGE.
 .\"
-.\" $FreeBSD: /repoman/r/ncvs/src/usr.sbin/setfmac/setfsmac.8,v 1.3 2003/05/31 18:42:18 ru Exp $
+.\" %FreeBSD: src/usr.sbin/setfmac/setfsmac.8,v 1.3 2003/05/31 18:42:18 ru Exp %
 .\"
+.\" $FreeBSD$
 .Dd March 13, 2003
 .Os
 .Dt SETFSMAC 8
-.Sh NAME
+.Sh $BL>>N(B
 .Nm setfsmac
-.Nd set MAC label for a file hierarchy
-.Sh SYNOPSIS
+.Nd $B%U%!%$%k3,AX$KBP$9$k(B MAC $B%i%Y%k$N@_Dj(B
+.Sh $B=q<0(B
 .Nm
 .Op Fl ehvx
 .Oo Fl f Ar specfile Oc ...
 .Oo Fl s Ar specfile Oc ...
 .Ar
-.Sh DESCRIPTION
-The
+.Sh $B2r@b(B
 .Nm
-utility accepts a list of specification files as input and sets the MAC
-labels on the specified file system hierarchies.
-Path names specified will be visited in order as given on the command
-line, and each tree will be traversed in pre-order.
-(Generally, it will not be very useful to use relative paths instead of
-absolute paths.)
-Multiple entries matching a single file will be combined and applied in
-a single transaction.
+$B%f!<%F%#%j%F%#$O!"F~NO$H$7$F;EMM%U%!%$%k$N%j%9%H$r<u$1<h$j!"(B
+$B;XDj$5$l$?%U%!%$%k%7%9%F%`3,AX$KBP$7$F(B MAC $B%i%Y%k$r@_Dj$7$^$9!#(B
+$B;XDj$5$l$?%Q%9L>$O!"%3%^%s%I9T$G;XDj$5$l$?=gHV$K=hM}$5$l!"(B
+$B3F%D%j!<$OA0=g=x(B (pre-order) $B$G=d2s$5$l$^$9(B
+($B0lHLE*$K$O!"(B
+$B@dBP%Q%9$NBe$j$KAjBP%Q%9$r;H$C$F$b$"$^$jM-MQ$G$O$J$$$G$7$g$&(B)$B!#(B
+$B$"$k%U%!%$%k$K%^%C%A$9$k%i%Y%k$O!"AH$_9g$o$;$F0l3g@_Dj$5$l$^$9!#(B
 .Pp
-The following options are available:
+$B<!$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl e
-Treat any file systems encountered which do not support MAC labelling as
-errors, instead of warning and skipping them.
+MAC $B%i%Y%k$r%5%]!<%H$7$J$$%U%!%$%k%7%9%F%`$K=P2q$&$H!"(B
+$B7Y9p$7$F%9%-%C%W$9$k$N$G$O$J$/!"(B
+$B%(%i!<$K$7$^$9!#(B
 .It Fl f Ar specfile
-Apply the specifications in
 .Ar specfile
-to the specified paths.
+$BCf$N;EMM$r!";XDj$5$l$?%Q%9$KE,MQ$7$^$9!#(B
 .\" XXX
 .Bf -emphasis
-NOTE: Only the first entry for each file is applied;
-all others are disregarded and silently dropped.
+$BCm(B: $B3F%U%!%$%k$N:G=i$N%(%s%H%j$N$_$,E,MQ$5$l$^$9!#(B
+$BB>$N$9$Y$F$OL5;k$5$l!"L[$C$F<N$F$i$l$^$9!#(B
 .Ef
-Multiple
+$BJ#?t$N(B
 .Fl f
-arguments may be specified to include multiple
-specification files.
+$B0z?t$r;XDj$9$k$3$H$G!"J#?t$N;EMM%U%!%$%k$r%$%s%/%k!<%I2DG=$G$9!#(B
 .It Fl h
-When a symbolic link is encountered, change the label of the link rather
-than the file the link points to.
+$B%7%s%\%j%C%/%j%s%/$K=P2q$&$H!"%j%s%/$,;X$9%U%!%$%k$NBe$j$K!"(B
+$B%j%s%/$=$N$b$N$N%i%Y%k$rJQ99$7$^$9!#(B
 .It Fl s Ar specfile
-Apply the specifications in
-.Ar specfile ,
-but assume the specification format is compatible with the SELinux
 .Ar specfile
-format.
+$BCf$N;EMM$rE,MQ$7$^$9$,!";EMM=q<0$O(B
+SELinux
+$B$N(B
+.Ar specfile
+$B$G$"$k$b$N$H2>Dj$5$l$^$9(B
 .\" XXX
 .Bf -emphasis
-NOTE: Only the first entry for each file is applied;
-all others are disregarded and silently dropped.
+$BCm(B: $B3F%U%!%$%k$N:G=i$N%(%s%H%j$N$_$,E,MQ$5$l$^$9!#(B
+$BB>$N$9$Y$F$OL5;k$5$l!"L[$C$F<N$F$i$l$^$9!#(B
 .Ef
-The prefix
+.Ar specfile
+$BCf$N%i%Y%k$KBP$7!"%W%l%U%#%C%/%9(B
 .Dq Li sebsd/
-will be automatically prepended to the labels in
-.Ar specfile .
-Labels matching
+$B$,<+F0E*$KIU$1$i$l$^$9!#(B
 .Dq Li <<none>>
-will be explicitly not relabeled.
-This permits SEBSD to reuse existing SELinux policy specification files.
+$B$K%^%C%A$9$k%i%Y%k$OL@<(E*$K:F%i%Y%k$5$l$^$;$s!#(B
+$B$3$l$K$h$j!"(B
+SEBSD
+$B$K$*$$$F!"4{B8$N(B
+SELinux
+$B%]%j%7;EMM%U%!%$%k$rL5=$@5$G:FMxMQ2DG=$K$J$j$^$9!#(B
 .It Fl v
-Increase the degree of verbosity.
+$B>iD9@-$rA}2C$5$;$^$9!#(B
 .It Fl x
-Do not recurse into new file systems when traversing them.
+$B%U%!%$%k%7%9%F%`=d2sCf$K!"?75,%U%!%$%k%7%9%F%`$X$OF~$j$^$;$s!#(B
 .El
-.Sh FILES
+.Sh $B4XO"%U%!%$%k(B
 .Bl -tag -width ".Pa /usr/share/security/lomac-policy.contexts" -compact
 .It Pa /usr/share/security/lomac-policy.contexts
-Sample specfile containing LOMAC policy entries.
+LOMAC $B%]%j%7%(%s%H%j$r4^$`!"%5%s%W%k$N;EMM%U%!%$%k(B
 .El
-.Sh EXAMPLES
-See
-.Sx FILES .
-.Sh AUTHORS
-This software was contributed to the
+.Sh $B;HMQNc(B
+.Sx $B4XO"%U%!%$%k(B
+$B@a$r;2>H$7$F$/$@$5$$!#(B
+.Sh $B:n<T(B
+$B$3$N%=%U%H%&%'%"$O!"(B
+Network Associates Labs,
+the Security Research Division of Network Associates Inc.
+$B$,!"(BDARPA CHATS $B8&5f%W%m%0%i%`$N0lIt$H$7$F!"(B
+DARPA/SPAWAR $B7@Ls(B N66001-01-C-8035
+.Pq Dq CBOSS
+$B$N$b$H$K!"(B
 .Fx
-Project by Network Associates Labs,
-the Security Research Division of Network Associates
-Inc. under DARPA/SPAWAR contract N66001-01-C-8035
-.Pq Dq CBOSS ,
-as part of the DARPA CHATS research program.
-.Sh SEE ALSO
+Project $B$K4sB#$7$^$7$?!#(B
+.Sh $B4XO"9`L\(B
 .Xr mac 3 ,
 .Xr mac_set_file 3 ,
 .Xr mac_set_link 3 ,

--- ugidfw.8~	Sun Aug 24 14:57:00 2003
+++ ugidfw.8	Sun Aug 24 15:29:02 2003
@@ -31,15 +31,16 @@
 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 .\" SUCH DAMAGE.
 .\"
-.\" $FreeBSD: src/usr.sbin/ugidfw/ugidfw.8,v 1.5 2002/12/12 14:09:25 ru Exp $
+.\" %FreeBSD: src/usr.sbin/ugidfw/ugidfw.8,v 1.5 2002/12/12 14:09:25 ru Exp %
 .\"
+.\" $FreeBSD$
 .Dd October 11, 2002
 .Dt UGIDFW 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm ugidfw
-.Nd "firewall-like access controls for file system objects"
-.Sh SYNOPSIS
+.Nd "$B%U%!%$%k%7%9%F%`%*%V%8%'%/%H$KBP$9$k%U%!%$%"%&%)!<%kE*$J%"%/%;%9@)8f(B"
+.Sh $B=q<0(B
 .Nm
 .Cm list
 .Nm
@@ -58,23 +59,23 @@
 .Nm
 .Cm remove
 .Ar rulenum
-.Sh DESCRIPTION
-The
+.Sh $B2r@b(B
 .Nm
-utility provides an
-.Xr ipfw 8 Ns -like
-interface to manage accesses to file system objects by UID and GID,
-supported by the
+$B%f!<%F%#%j%F%#$O!"(BUID $B$*$h$S(B GID $B$K$h$k%U%!%$%k%7%9%F%`%*%V%8%'%/%H$N(B
+$B%"%/%;%9$r4IM}$9$k$?$a$K!"(B
+.Xr ipfw 8
+$B$K;w$?%$%s%?%U%'!<%9$rDs6!$7$^$9!#(B
+$B$3$N5!G=$O(B
 .Xr mac_bsdextended 4
 .Xr mac 9
-policy.
+$B%]%j%7$K$h$C$F%5%]!<%H$5$l$F$$$^$9!#(B
 .Pp
-The arguments are as follows:
+$B0z?t$O<!$NDL$j$G$9(B:
 .Bl -tag -width indent -offset indent
 .It Cm list
-Produces a list of all the current
+$B%7%9%F%`>e$K8=:_$"$k$9$Y$F$N(B
 .Nm
-rules in the system.
+$B%k!<%k%j%9%H$rI=<($7$^$9!#(B
 .It Xo
 .Cm set Ar rulenum
 .Cm subject
@@ -88,93 +89,88 @@
 .Cm mode
 .Ar arswxn
 .Xc
-Add a new rule or modify an existing rule.
-The arguments are as follows:
+$B?75,$N%k!<%k$rDI2C$9$k$+!"4{B8$N%k!<%k$r=$@5$7$^$9!#(B
+$B0z?t$O<!$NDL$j$G$9(B:
 .Bl -tag -width ".Ar rulenum"
 .It Ar rulenum
-Rule number.
-Entries with a lower rule number
-are applied first;
-placing the most frequently-matched rules at the beginning of the list
-(i.e. lower-numbered)
-will yield a slight performance increase.
+$B%k!<%kHV9f!#(B
+$B>.$5$$%k!<%kHV9f$r;}$D%(%s%H%j$,@h$KE,MQ$5$l$^$9!#(B
+$B:G$bIQHK$K%^%C%A$9$k%k!<%k$r%j%9%H$N@hF,$KCV$/(B
+($B$9$J$o$A>.$5$$HV9f$K$9$k(B) $B$H!">/!9@-G=$,NI$/$J$j$^$9!#(B
 .It Xo
 .Cm subject
 .Op Cm not
 .Op Cm uid Ar uid
 .Op Cm gid Ar gid
 .Xc
-Subjects performing an operation must match
-(or, if
-.Cm not
-is specified, must
-.Em not
-match)
-the user and group specified by
+$B%k!<%k$,E,MQ$5$l$k$?$a$K$O!"(B
+$BA`:n$r<B9T$9$k<gBN$,(B
 .Ar uid
-and/or
+$B$d(B
 .Ar gid
-for the rule to be applied.
+$B$G;XDj$5$l$k%f!<%6$d%0%k!<%W$K%^%C%A$9$k$3$H$,I,MW$G$9(B
+.Cm ( not
+$B$,;XDj$5$l$F$$$k>l9g$K$O!"%^%C%A(B
+.Em $B$7$J$$(B
+$B$3$H$,I,MW$G$9(B)$B!#(B
 .It Xo
 .Cm object
 .Op Cm not
 .Op Cm uid Ar uid
 .Op Cm gid Ar gid
 .Xc
-Objects must be owned by
-(or, if
-.Cm not
-is specified, must
-.Em not
-be owned by)
-the user and/or group specified by
+$B%k!<%k$,E,MQ$5$l$k$?$a$K$O!"(B
+$B%*%V%8%'%/%H$,(B
 .Ar uid
-and/or
+$B$d(B
 .Ar gid
-for the rule to be applied.
+$B$G;XDj$5$l$k%f!<%6$d%0%k!<%W$K=jM-$5$l$F$$$k$3$H$,I,MW$G$9(B
+.Cm ( not
+$B$,;XDj$5$l$F$$$k>l9g$K$O!"=jM-$5$l$F(B
+.Em $B$$$J$$(B
+$B$3$H$,I,MW$G$9(B)$B!#(B
 .It Cm mode Ar arswxn
-Similar to
-.Xr chmod 1 ,
-each character represents an access mode.
-If the rule applies,
-the specified access permissions are enforced
-for the object.
-When a character is specified in the rule,
-the rule will allow for the operation.
-Conversely, not including it will cause the operation
-to be denied.
-The definitions of each character are as follows:
+.Xr chmod 1
+$B$HF1MM!"3FJ8;z$,%"%/%;%9%b!<%I$rI=8=$7$^$9!#(B
+$B%k!<%k$,E,MQ$5$l$k>l9g!"(B
+$B;XDj$5$l$?%"%/%;%98"8B$,%*%V%8%'%/%H$KBP$7$F6/@)$5$l$^$9!#(B
+$B%k!<%kCf$KJ8;z$,;XDj$5$l$F$$$?>l9g!"%k!<%k$O$=$NA`:n$r5v2D$7$^$9!#(B
+$B5U$K!"J8;z$,;XDj$5$l$F$$$J$$>l9g!"$=$NA`:n$O5qH]$5$l$^$9!#(B
+$B3FJ8;z$NDj5A$O<!$NDL$j$G$9(B:
 .Pp
 .Bl -tag -width ".Cm w" -compact -offset indent
 .It Cm a
-administrative operations
+$B4IM}<TA`:n(B
 .It Cm r
-read access
+$BFI$_<h$j%"%/%;%9(B
 .It Cm s
-access to file attributes
+$B%U%!%$%kB0@-$KBP$9$k%"%/%;%9(B
 .It Cm w
-write access
+$B=q$-9~$_%"%/%;%9(B
 .It Cm x
-execute access
+$B<B9T%"%/%;%9(B
 .It Cm n
-none
+$BL5$7(B
 .El
 .El
 .It Cm remove Ar rulenum
-Disable and remove the rule with the specified rule number.
+$B;XDj$7$?%k!<%kHV9f$r;}$D%k!<%k$rL58z2=$7!":o=|$7$^$9!#(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr mac_bsdextended 4 ,
 .Xr mac 9
-.Sh HISTORY
-The
+.Sh $BNr;K(B
 .Nm
-utility first appeared in
-.Fx 5.0 .
-.Sh AUTHORS
-This software was contributed to the
+$B%f!<%F%#%j%F%#$,:G=i$KEP>l$7$?$N$O(B
+.Fx 5.0
+$B$G$9!#(B
+.Sh $B:n<T(B
+$B$3$N%=%U%H%&%'%"$O!"(B
+NAI Labs,
+the Security Research Division of Network Associates Inc.
+$B$,!"(BDARPA CHATS $B8&5f%W%m%0%i%`$N0lIt$H$7$F!"(B
+DARPA/SPAWAR $B7@Ls(B N66001-01-C-8035
+.Pq Dq CBOSS
+$B$N$b$H$K!"(B
 .Fx
-Project by NAI Labs, the Security Research Division of Network Associates
-Inc. under DARPA/SPAWAR contract N66001-01-C-8035
-.Pq Dq CBOSS ,
-as part of the DARPA CHATS research program.
+Project $B$K4sB#$7$^$7$?!#(B

--
$BKY@nOBM:(B
