f5a4191b5c
are hosting browser exploits that can infect visiting users with malware. It functions as an HTTP proxy server and intercepts all browser requests. SpyBye uses a few simple rules to determine if embedded links on your web page are harmlesss, unknown or maybe even dangerous. SpyBye analyzes all downloads in the background and provides you with a warning notification whenever it encounters content that is potentially malicious. At that point, you can click on the link in the notification and receive a more detailed analysis of the web page. WWW: http://www.spybye.org/ PR: ports/123945 Submitted by: Paul Schmel <pauls utdallas.edu> Approved by: tabthorpe (mentor)
34 lines
738 B
Makefile
34 lines
738 B
Makefile
# New ports collection makefile for: spybye
|
|
# Date created: 23 May 2008
|
|
# Whom: pauls
|
|
#
|
|
# $FreeBSD$
|
|
#
|
|
|
|
PORTNAME= spybye
|
|
PORTVERSION= 0.3
|
|
CATEGORIES= security www
|
|
MASTER_SITES= http://www.monkey.org/~provos/
|
|
|
|
MAINTAINER= pauls@utdallas.edu
|
|
COMMENT= A web proxy to detect malware
|
|
|
|
BUILD_DEPENDS= event_rpcgen.py:${PORTSDIR}/devel/libevent
|
|
|
|
OPTIONS= CLAMAV "Enable CLAMAV support" off
|
|
|
|
USE_RC_SUBR= spybye.sh
|
|
GNU_CONFIGURE= yes
|
|
CONFIGURE_ENV= LDFLAGS="${LDFLAGS}"
|
|
CONFIGURE_TARGET= --build=${MACHINE_ARCH}-portbld-freebsd${OSREL}
|
|
|
|
MAN1= spybye.1
|
|
|
|
.include <bsd.port.pre.mk>
|
|
|
|
.if defined(WITH_CLAMAV)
|
|
LIB_DEPENDS+= clamav:${PORTSDIR}/security/clamav
|
|
CONFIGURE_ARGS+= --with-libclamav=${PREFIX}/bin
|
|
.endif
|
|
|
|
.include <bsd.port.post.mk>
|