diff --git a/nmap-3.81-noms.patch b/nmap-3.81-noms.patch
new file mode 100644
index 0000000..f12903f
--- /dev/null
+++ b/nmap-3.81-noms.patch
@@ -0,0 +1,65 @@
+diff -ur nmap-3.81/docs/nmap.1 nmap-3.81.noms/docs/nmap.1
+--- nmap-3.81/docs/nmap.1 2005-02-07 08:26:08.000000000 +0100
++++ nmap-3.81.noms/docs/nmap.1 2005-08-03 14:03:50.000000000 +0200
+@@ -131,7 +131,7 @@
+ on a network are up. Nmap can do this by sending ICMP echo
+ request packets to every IP address on the networks you
+ specify. Hosts that respond are up. Unfortunately, some
+-sites such as microsoft.com block echo request packets.
++sites block echo request packets.
+ Thus nmap can also send a TCP ack packet to (by default)
+ port 80. If we get an RST back, that machine is up. A
+ third technique involves sending a SYN packet and waiting
+@@ -352,12 +352,7 @@
+ Do not try to ping hosts at all before scanning them. This
+ allows the scanning of networks that don't allow ICMP echo
+ requests (or responses) through their firewall.
+-microsoft.com is an example of such a network, and thus you
+-should always use
+-.B \-P0
+-or
+-.B \-PS80
+-when portscanning microsoft.com. Note that "ping" in this context may
++Note that "ping" in this context may
+ involve more than the traditional ICMP echo request packet. Nmap
+ supports many such probes, including arbitrary combinations of TCP,
+ UDP, and ICMP probes. By default, Nmap sends an ICMP echo request and
+diff -ur nmap-3.81/docs/nmap_doc.html nmap-3.81.noms/docs/nmap_doc.html
+--- nmap-3.81/docs/nmap_doc.html 2001-03-27 05:07:57.000000000 +0200
++++ nmap-3.81.noms/docs/nmap_doc.html 2005-08-03 14:02:18.000000000 +0200
+@@ -361,7 +361,7 @@
+ things up. You can change the parrallel ping lookahead with '-L' and
+ the ping timeout with '-T'. You can turn pinging off completely with
+ the '-D' command line option. This is useful for scanning networks
+-like microsoft.com where ICMP echo requests can't get through. Nmap
++where ICMP echo requests can't get through. Nmap
+ is also capable of bailing on hosts that seem down based on strange
+ port scanning errors. It is also meant to be tolerant of people who
+ accidentally scan network addresses, broadcast addresses, etc.
+diff -ur nmap-3.81/docs/nmap_manpage.html nmap-3.81.noms/docs/nmap_manpage.html
+--- nmap-3.81/docs/nmap_manpage.html 2005-02-07 09:54:33.000000000 +0100
++++ nmap-3.81.noms/docs/nmap_manpage.html 2005-08-03 14:02:49.000000000 +0200
+@@ -130,8 +130,8 @@
+ -sP Ping scanning: Sometimes you only want to know which hosts on a
+ network are up. Nmap can do this by sending ICMP echo request
+ packets to every IP address on the networks you specify. Hosts
+- that respond are up. Unfortunately, some sites such as
+- microsoft.com block echo request packets. Thus nmap can also
++ that respond are up. Unfortunately, some sites
++ block echo request packets. Thus nmap can also
+ send a TCP ack packet to (by default) port 80. If we get an RST
+ back, that machine is up. A third technique involves sending a
+ SYN packet and waiting for a RST or a SYN/ACK. For non-root
+diff -ur nmap-3.81/docs/nmap.usage.txt nmap-3.81.noms/docs/nmap.usage.txt
+--- nmap-3.81/docs/nmap.usage.txt 2005-02-07 09:54:32.000000000 +0100
++++ nmap-3.81.noms/docs/nmap.usage.txt 2005-08-03 14:01:38.000000000 +0200
+@@ -12,7 +12,7 @@
+ -p ports to scan. Example range: 1-1024,1080,6666,31337
+ -F Only scans ports listed in nmap-services
+ -v Verbose. Its use is recommended. Use twice for greater effect.
+- -P0 Don't ping hosts (needed to scan www.microsoft.com and others)
++ -P0 Don't ping hosts
+ * -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
+ -6 scans via IPv6 rather than IPv4
+ -T General timing policy
+
diff --git a/nmap.spec b/nmap.spec
index 413ab21..fc65fb0 100644
--- a/nmap.spec
+++ b/nmap.spec
@@ -3,7 +3,7 @@
Summary: Network exploration tool and security scanner
Name: nmap
Version: 3.81
-Release: 3
+Release: 4
License: GPL
Group: Applications/System
Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tar.bz2
@@ -13,6 +13,7 @@ Source3: nmapfe-48.png
Patch0: inet_aton.patch
Patch1: makefile.patch
Patch2: nmap-3.78-gtk2.patch
+Patch3: nmap-3.81-noms.patch
URL: http://www.insecure.org/nmap/
BuildRoot: %{_tmppath}/%{name}-root
Epoch: 2
@@ -40,6 +41,7 @@ be installed before installing nmap-frontend.
%if ! %{withgtk1}
%patch2 -p1 -b .gtk2
%endif
+%patch3 -p1 -b .noms
%build
%configure --with-libpcap=/usr
@@ -87,6 +89,9 @@ rm -rf $RPM_BUILD_ROOT
%{_mandir}/man1/xnmap.1.gz
%changelog
+* Wed Aug 03 2005 Harald Hoyer - 2:3.81-4
+- removed references how to scan microsoft.com (bz #164962)
+
* Thu Apr 21 2005 Harald Hoyer - 2:3.81-3
- removed gtk+ requirement