You can find documentation for various sections of the config on these wiki pages: The configuration is live-reloaded. Simply edit and save the config file, and your changes will be applied. This ...
Ensure you have explicit written permission before scanning any network Only use on systems you own or have explicit authorization to test Unauthorized access to computer systems is illegal Users are ...