
 GPS-0.9.2
		- pcap_open_live problem under BSD fixed.

 GPS-0.9.1
		- symlink problem fixed. You can now compile without having
		  autoconf installed.

 GPS-0.9.0
		- new architecture, improving reliability and consisting
		  in the implementation of a dynamic emission window and
		  the improvement of timeout handling.
		- support of UDP scan
		- lots of optimizations
		- the scan speed has been significantly increased
		- even more portability. GPS now compiles on BSD, and is
		  fully fonctionnal under these OSs.
		- localhost scaning is supported on 2.0, 2.2 and 2.4
		  linux kernels.

 GPS-0.8.1
		- GPS now uses only high level headers (not system-dependent).
		  It should help to compile it on other systems, such as BSD.
		- little improvement of the compiling scripts.
		- add of a basic script to compile without configuring.
		- routing functions are now safe, efficient and optimized.

 GPS-0.8.0
		- safe signal handling (safe according to me)
		- rewrite of the -s argument handler (more flexible)
		- rewrite of the ARP cache browser (now safe and optimised)
		- creation of a suitable device browser (which is still not perfect,
		  and I am looking for a trick to cleanly browse the route table. If
		  you are aware of such a thing, please mail me).
		- localhost scanning support
		- auto determination of usable source IPs, if none are specified
		- some bugfixes (as usual)

 GPS-0.7.1
		- some optimizations, especially for results computing
		- timeout evaluation fail fixed (almost)
		- more modularity

 GPS-0.7.0
		- full MAC spoofing support (the scan is _absolutely_ untrackable)
		- fragmentation support (tiny fragments and fragment overlapping)
		- timeout handling in timeout evaluation
		- pure fat configure script (thanks to autoconf/automake)

 GPS-0.6.1
		- ethernet interface choice
		- configure script (thanks to Draxey)

 GPS-0.6.0
		- smart timeout handling
		- reliability really improved

 GPS-0.5.0 and before
		- SYN, FIN, NULL, XMAS, ACK, RAND, FWRD scans support
		- ARP poisoning to have things working
		- sniffing to get responses
		- IP spoofing for packet injection
		- multiple spoofed source hosts support

