Installed: tcpflow_0.12-3_i386.deb to dists/woody/main/binary-i386/net/tcpflow_0.12-3.deb replacing tcpflow_0.12-2.deb tcpflow_0.12-3.diff.gz to dists/woody/main/source/net/tcpflow_0.12-3.diff.gz replacing tcpflow_0.12-2.diff.gz tcpflow_0.12-3.dsc to dists/woody/main/source/net/tcpflow_0.12-3.dsc replacing tcpflow_0.12-2.dsc -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thu, 30 Nov 2000 00:44:22 +0000 Source: tcpflow Binary: tcpflow Architecture: source i386 Version: 0.12-3 Distribution: unstable Urgency: low Maintainer: Robert McQueen <robot101@debian.org> Changed-By: Robert McQueen <robot101@debian.org> Description: tcpflow - TCP flow recorder Changes: tcpflow (0.12-3) unstable; urgency=low . * Package now builds on woody, but its an evil hack so bug #76807 stays open. Thanks to Alexander Kotelnikov <sacha@debian.org> for helping me fix this. * Removed spurious menu entry. * Upgraded policy version and tidied debian/rules. * Changed to @debian.org maintainer address. Files: ade6e6d63d29bf8b58fd2e32c479ebad 605 net optional tcpflow_0.12-3.dsc a272dd163dcfdc86f27d34e06ab29f23 2881 net optional tcpflow_0.12-3.diff.gz 10017d5817103c13cdb79caf3bbc33a8 20196 net optional tcpflow_0.12-3_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE6JalLXcrf4TUB5sURAvhNAJ9bJ6f3hDy9zekSba07NH6V8jJTEACfX6U3 rOULsgxOwolen+YxSP3UWNw= =Fjmf -----END PGP SIGNATURE-----