diff options
author | Barry J. Grundy <bgrundyatlinuxleo.com> | 2013-03-11 19:30:13 -0400 |
---|---|---|
committer | dsomero <xgizzmo@slackbuilds.org> | 2013-03-22 07:16:40 -0400 |
commit | d30c249588095443f15225c70d35f8099efff699 (patch) | |
tree | 7652a6dcae09dcdd1384ed9ab71d29cac32dd073 /system/sleuthkit | |
parent | bb8798c4d225252f1ce5567708f3bb71570d1be0 (diff) | |
download | slackbuilds-d30c249588095443f15225c70d35f8099efff699.tar.gz |
system/sleuthkit: Updated for version 4.0.2.
Signed-off-by: dsomero <xgizzmo@slackbuilds.org>
Diffstat (limited to 'system/sleuthkit')
-rw-r--r-- | system/sleuthkit/README | 18 | ||||
-rw-r--r-- | system/sleuthkit/slack-desc | 24 | ||||
-rw-r--r-- | system/sleuthkit/sleuthkit.SlackBuild | 6 | ||||
-rw-r--r-- | system/sleuthkit/sleuthkit.info | 6 |
4 files changed, 29 insertions, 25 deletions
diff --git a/system/sleuthkit/README b/system/sleuthkit/README index 0d3bcb40ce..f64c370f72 100644 --- a/system/sleuthkit/README +++ b/system/sleuthkit/README @@ -1,8 +1,12 @@ -The Sleuth Kit is an open source forensic toolkit for analyzing -Microsoft and UNIX file systems and disks. The Sleuth Kit enables -investigators to identify and recover evidence from images -acquired during incident response or from live systems. The -Sleuth Kit is open source, which allows investigators to verify -the actions of the tool or customize it to specific needs. +The Sleuth Kit (TSK) is a library and collection of command line +tools that allow you to investigate disk images. The core +functionality of TSK allows you to analyze volume and file system +data. The plug-in framework allows you to incorporate additional +modules to analyze file contents and build automated systems. The +library can be incorporated into larger digital forensics tools and +the command line tools can be directly used to find evidence. -Sleuthkit can use libewf and afflib. + +Sleuthkit can optionally use libewf (for Expert Witness files) +and afflib (for Advanced Forensic Format files). Both are available +in SBo. diff --git a/system/sleuthkit/slack-desc b/system/sleuthkit/slack-desc index da8bebf4f3..07daf92a51 100644 --- a/system/sleuthkit/slack-desc +++ b/system/sleuthkit/slack-desc @@ -1,19 +1,19 @@ # HOW TO EDIT THIS FILE: -# The "handy ruler" below makes it easier to edit a package description. Line -# up the first '|' above the ':' following the base package name, and the '|' -# on the right side marks the last column you can put a character in. You must -# make exactly 11 lines for the formatting to be correct. It's also -# customary to leave one space after the ':'. +# The "handy ruler" below makes it easier to edit a package description. +# Line up the first '|' above the ':' following the base package name, and +# the '|' on the right side marks the last column you can put a character in. +# You must make exactly 11 lines for the formatting to be correct. It's also +# customary to leave one space after the ':' except on otherwise blank lines. |-----handy-ruler------------------------------------------------------| sleuthkit: sleuthkit (forensic toolkit) sleuthkit: -sleuthkit: The Sleuth Kit is an open source forensic toolkit for analyzing -sleuthkit: Microsoft and UNIX file systems and disks. The Sleuth Kit enables -sleuthkit: investigators to identify and recover evidence from images -sleuthkit: acquired during incident response or from live systems. The -sleuthkit: Sleuth Kit is open source, which allows investigators to verify -sleuthkit: the actions of the tool or customize it to specific needs. +sleuthkit: The Sleuth Kit (TSK) is a library and collection of command line +sleuthkit: tools that allow you to investigate disk images. The core +sleuthkit: functionality of TSK allows you to analyze volume and file system +sleuthkit: data. The plug-in framework allows you to incorporate additional +sleuthkit: modules to analyze file contents and build automated systems. The +sleuthkit: library can be incorporated into larger digital forensics tools and +sleuthkit: the command line tools can be directly used to find evidence. sleuthkit: sleuthkit: Homepage: http://www.sleuthkit.org/sleuthkit/ -sleuthkit: diff --git a/system/sleuthkit/sleuthkit.SlackBuild b/system/sleuthkit/sleuthkit.SlackBuild index 1f4021870f..aacd96ac43 100644 --- a/system/sleuthkit/sleuthkit.SlackBuild +++ b/system/sleuthkit/sleuthkit.SlackBuild @@ -22,10 +22,10 @@ # OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF # ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. -# Updated v3.2.3 November 2011 Barry J. Grundy <bgrundy(at)linuxleo.com> +# Updated v4.0.2 March 2013 Barry J. Grundy <bgrundy(at)linuxleo.com> PRGNAM=sleuthkit -VERSION=3.2.3 +VERSION=4.0.2 BUILD=${BUILD:-1} TAG=${TAG:-_SBo} @@ -88,7 +88,7 @@ for i in $( find $PKG/usr/man -type l ) ; do ln -s $( readlink $i ).gz $i.gz ; r # "docs" directory now contains a simple pointer to the wiki. mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION -cp -a *.txt licenses $PKG/usr/doc/$PRGNAM-$VERSION +cp -ri *.txt licenses docs $PKG/usr/doc/$PRGNAM-$VERSION cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild rm -f $PKG/usr/doc/$PRGNAM-$VERSION/docs/Makefile* diff --git a/system/sleuthkit/sleuthkit.info b/system/sleuthkit/sleuthkit.info index cbb096b913..3d61de5bdc 100644 --- a/system/sleuthkit/sleuthkit.info +++ b/system/sleuthkit/sleuthkit.info @@ -1,8 +1,8 @@ PRGNAM="sleuthkit" -VERSION="3.2.3" +VERSION="4.0.2" HOMEPAGE="http://www.sleuthkit.org/sleuthkit/" -DOWNLOAD="http://downloads.sourceforge.net/sleuthkit/sleuthkit-3.2.3.tar.gz" -MD5SUM="29465ebe32cfeb5f0cab83e4e93823c5" +DOWNLOAD="http://downloads.sourceforge.net/project/sleuthkit/sleuthkit/4.0.2/sleuthkit-4.0.2.tar.gz" +MD5SUM="0ca010103990b390794d682b37310af0" DOWNLOAD_x86_64="" MD5SUM_x86_64="" REQUIRES="" |