One of the biggest security holes are user passwords, as every
password security study shows. This tool is a proof of concept,
to give researchers and security consultants a way to demonstrate
how easy it would be to gain unauthorized access to a remote system.
           THIS TOOL IS FOR LEGAL PURPOSES ONLY!

Requires:
 subversion	(available in Slackware)
 apr & apr-util	(available in Slackware)
 libssh		(not libssh2, available at Slackbuilds.org)

Optional:
 postgresql	(available at Slackbuilds.org)
 sap            (available at http://www.sap.com/solutions/netweaver/linux/eval/index.asp)
