summaryrefslogtreecommitdiffstats
path: root/perl-install/standalone/net_applet
diff options
context:
space:
mode:
Diffstat (limited to 'perl-install/standalone/net_applet')
-rw-r--r--perl-install/standalone/net_applet10
1 files changed, 5 insertions, 5 deletions
diff --git a/perl-install/standalone/net_applet b/perl-install/standalone/net_applet
index 1311da3fe..d8e72394e 100644
--- a/perl-install/standalone/net_applet
+++ b/perl-install/standalone/net_applet
@@ -109,7 +109,7 @@ my $interactive_cb;
my @attacks_queue;
if ($enable_activefw) {
- $activefw = activefw->new(sub {
+ $activefw = network::activefw->new(sub {
my ($_con, $msg) = @_;
handle_attack($msg->get_args_list) if
$msg->get_interface eq "com.mandrakesoft.activefirewall" &&
@@ -263,9 +263,9 @@ sub ask_attack_verdict {
return;
}
- my $ip_addr = activefw::get_ip_address($addr);
- my $hostname = activefw::resolve_address($ip_addr);
- my $service = activefw::get_service($port);
+ my $ip_addr = network::activefw::get_ip_address($addr);
+ my $hostname = network::activefw::resolve_address($ip_addr);
+ my $service = network::activefw::get_service($port);
my $msg = $prefix eq "SCAN" ? N("A port scanning attack has been attempted by %s.", $hostname)
: $prefix eq "SERV" ? N("The %s service has been attacked by %s.", $service , $hostname)
@@ -309,7 +309,7 @@ sub ask_attack_verdict {
gtknew('HBox', children => [
0, gtknew('Label', text => " "),
1, gtknew('VBox', children_loose => [
- N("Attack time: %s", activefw::format_date($timestamp)),
+ N("Attack time: %s", network::activefw::format_date($timestamp)),
N("Network interface: %s", $indev),
N("Attack type: %s", $prefix),
if_($protocol, N("Protocol: %s", $protocol)),