معرفی شرکت ها


stealth-doc_4.03.03-1_all.deb


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

stealthy File Integrity Checker documentation
ویژگی مقدار
سیستم عامل Linux
توزیع Debian Bookworm-12
مخزن Debian main all
نام بسته stealth-doc
نام فایل بسته stealth-doc_4.03.03-1_all.deb
نسخه بسته 4.03.03
انتشار بسته 1
معماری بسته all
نگهدارنده Frank B. Brokken <f.b.brokken@rug.nl>
تاریخ ساخت -
هاست سازنده -
نوع بسته .deb
آدرس صفحه اصلی https://fbb-git.gitlab.io/stealth
مجوز -
حجم دانلود 388076
حجم نصب 496
STEALTH program performs File Integrity Checks on (remote) clients. It differs from other File Integrity Checkers by not requiring baseline integrity data to be kept on either write-only media or in the client's file system. In fact, client's will contain hardly any indication at all that they are being monitored, thus improving the stealthiness of the integrity scans. . STEALTH uses standard available software to perform file integrity checks (like find(1) and md5sum(1)). Using individualized policy files, it is highly adaptable to the specific requirements of its clients. . In production environments STEALTH should be run from an isolated computer (called the `STEALTH monitor'). In optimal configurations the STEALTH monitor should be a computer not accepting incoming connections. The account used to connect to its clients does not have to be `root': usually read-access to the client's file system is enough to perform a full integrity check. Instead of using `root' a more restrictive administrative or ordinary account might offer all requirements for the desired integrity check. . STEALTH itself must communicate with the computers it should monitor. It is essential that this communication is secure, and STEALTH configurations will therefore normally specify SSH as the command-shell to use to connect to its clients. STEALTH may be configured so as to use but one SSH connection per client, even if integrity scans are to be performed repeatedly. Apart from this, the STEALTH monitor might be allowed to send e-mail to remote clients system's maintainers. . STEALTH-runs itself may start randomly within specified intervals. The resulting unpredicability of STEALTH-runs further increases STEALTH's stealthiness. . STEALTH's acronym is expanded to `Ssh-based Trust Enforcement Acquired through a Locally Trusted Host': the client's trust is enforced, the locally trusted host is the STEALTH monitor. . This package provides the supplemental documentation for Stealth.


نیازمندی

مقدار نام
-


نحوه نصب


نصب پکیج deb stealth-doc:

    sudo apt-get install stealth-doc_4.03.03-1_all.deb


فایل ها

مسیرها
./usr/share/doc/stealth-doc/ACKNOWLEDGEMENTS.gz
./usr/share/doc/stealth-doc/README.3.00.00.gz
./usr/share/doc/stealth-doc/README.gz
./usr/share/doc/stealth-doc/changelog.Debian.gz
./usr/share/doc/stealth-doc/changelog.gz
./usr/share/doc/stealth-doc/copyright
./usr/share/doc/stealth-doc/examples/demo.pol.gz
./usr/share/doc/stealth-doc/examples/localhost.pol.gz
./usr/share/doc/stealth-doc/examples/simple.pol.gz
./usr/share/doc/stealth-doc/manual/LaTeX/stealth.dvi.gz
./usr/share/doc/stealth-doc/manual/LaTeX/stealth.latex.gz
./usr/share/doc/stealth-doc/manual/LaTeX/stealth.sty.gz
./usr/share/doc/stealth-doc/manual/html/stealth.html
./usr/share/doc/stealth-doc/manual/html/stealth01.html
./usr/share/doc/stealth-doc/manual/html/stealth02.html
./usr/share/doc/stealth-doc/manual/html/stealth03.html
./usr/share/doc/stealth-doc/manual/html/stealth04.html
./usr/share/doc/stealth-doc/manual/html/stealth05.html
./usr/share/doc/stealth-doc/manual/html/stealth06.html
./usr/share/doc/stealth-doc/manual/html/stealth07.html
./usr/share/doc/stealth-doc/manual/html/stealth08.html
./usr/share/doc/stealth-doc/manual/pdf/stealth.pdf.gz
./usr/share/doc/stealth-doc/stealth.xref.gz